CVE-2025-59969
Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition.
This issue affects Junos OS Evolved PTX Series:
- All versions before 22.4R3-S8-EVO,
- from 23.2 before 23.2R2-S5-EVO,
- from 23.4 before 23.4R2-EVO,
- from 24.2 before 24.2R2-EVO,
- from 24.4 before 24.4R2-EVO.
This issue affects Junos OS Evolved on QFX5000 Series:
- 22.2-EVO version before 22.2R3-S7-EVO,
- 22.4-EVO version before 22.4R3-S7-EVO,
- 23.2-EVO versions before 23.2R2-S4-EVO,
- 23.4-EVO versions before 23.4R2-S5-EVO,
- 24.2-EVO versions before 24.2R2-S1-EVO,
- 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.
This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.
Affected products
57cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*+ 56 more
- cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*range: <22.4
- cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- kb.juniper.net/JSA103159nvdVendor Advisory
News mentions
0No linked articles in our index yet.