Unrated severityNVD Advisory· Published Jan 15, 2026· Updated Mar 16, 2026
Junos OS: A specifically crafted 'show chassis' command causes chassisd to crash
CVE-2025-60007
Description
A NULL Pointer Dereference vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS on MX, SRX and EX Series allows a local attacker with low privileges to cause a Denial-of-Service (DoS).
When a user executes the 'show chassis' command with specifically crafted options, chassisd will crash and restart. Due to this all components but the Routing Engine (RE) in the chassis are reinitialized, which leads to a complete service outage, which the system automatically recovers from.
This issue affects:
Junos OS on MX, SRX and EX Series, except MX10000 Series and MX304:
- all versions before 22.4R3-S8,
- 23.2 versions before 23.2R2-S5,
- 23.4 versions before 23.4R2-S6,
- 24.2 versions before 24.2R2-S2,
- 24.4 versions before 24.4R2.
Affected products
2- Range: <22.4R3-S8, >=23.2 <23.2R2-S5, >=23.4 <23.4R2-S6, >=24.2 <24.2R2-S2, >=24.4 <24.4R2
- Juniper Networks/Junos OSv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- kb.juniper.net/JSA103173mitrevendor-advisory
- supportportal.juniper.netmitrevendor-advisory
News mentions
0No linked articles in our index yet.