VYPR
Medium severity6.5NVD Advisory· Published Apr 9, 2026· Updated Apr 28, 2026

CVE-2025-59969

CVE-2025-59969

Description

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition.

This issue affects Junos OS Evolved PTX Series:

  • All versions before 22.4R3-S8-EVO,
  • from 23.2 before 23.2R2-S5-EVO,
  • from 23.4 before 23.4R2-EVO,
  • from 24.2 before 24.2R2-EVO,
  • from 24.4 before 24.4R2-EVO.

This issue affects Junos OS Evolved on QFX5000 Series:

  • 22.2-EVO version before 22.2R3-S7-EVO,
  • 22.4-EVO version before 22.4R3-S7-EVO,
  • 23.2-EVO versions before 23.2R2-S4-EVO,
  • 23.4-EVO versions before 23.4R2-S5-EVO,
  • 24.2-EVO versions before 24.2R2-S1-EVO,
  • 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.

This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.

Affected products

57
  • cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*+ 56 more
    • cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*range: <22.4
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s5:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s6:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s5:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s6:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s7:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.