Unrated severityNVD Advisory· Published Jul 11, 2025· Updated Feb 26, 2026
Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout'
CVE-2025-52988
Description
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root.
When a user provides specifically crafted arguments to the 'request system logout' command, these will be executed as root on the shell, which can completely compromise the device. This issue affects:
Junos OS:
- all versions before 21.2R3-S9,
- 21.4 versions before 21.4R3-S8,
- 22.2 versions before 22.2R3-S6,
- 22.3 versions before 22.3R3-S3,
- 22.4 versions before 22.4R3-S6,
- 23.2 versions before 23.2R2-S1,
- 23.4 versions before 23.4R1-S2, 23.4R2;
Junos OS Evolved:
- all versions before 22.4R3-S6-EVO,
- 23.2-EVO versions before 23.2R2-S1-EVO,
- 23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO.
Affected products
3all versions before 22.4R3-S6-EVO, 23.2-EVO versions before 23.2R2-S1-EVO, 23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO+ 1 more
- (no CPE)range: all versions before 22.4R3-S6-EVO, 23.2-EVO versions before 23.2R2-S1-EVO, 23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO
- (no CPE)range: 0
- Range: all versions before 21.2R3-S9, 21.4 versions before 21.4R3-S8, 22.2 versions before 22.2R3-S6, 22.3 versions before 22.3R3-S3, 22.4 versions before 22.4R3-S6, 23.2 versions before 23.2R2-S1, 23.4 versions before 23.4R1-S2, 23.4R2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- supportportal.juniper.net/JSA100095mitrevendor-advisory
News mentions
0No linked articles in our index yet.