First published: Thu Jan 09 2025(Updated: )
An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS). On devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet which will cause the rpd to crash and restart. Continued receipt of these UPDATE packets will cause a sustained DoS condition. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S10, * from 22.2 before 22.2R3-S5, * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S3, * from 23.2 before 23.2R2-S2, * from 23.4 before 23.4R2; and Junos OS Evolved: * All versions before 21.2R3-S9-EVO, * from 21.4-EVO before 21.4R3-S10-EVO, * from 22.2-EVO before 22.2R3-S5-EVO, * from 22.3-EVO before 22.3R3-S4-EVO, * from 22.4-EVO before 22.4R3-S3-EVO, * from 23.2-EVO before 23.2R2-S2-EVO, * from 23.4-EVO before 23.4R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.2R3-S9>21.4<21.4R3-S10>22.2<22.2R3-S5>22.3<22.3R3-S4>22.4<22.4R3-S3>23.2<23.2R2-S2>23.4<23.4R2 | |
Juniper Networks Junos OS | <21.2R3-S9-EVO>21.4-EVO<21.4R3-S10-EVO>22.2-EVO<22.2R3-S5-EVO>22.3-EVO<22.3R3-S4-EVO>22.4-EVO<22.4R3-S3-EVO>23.2-EVO<23.2R2-S2-EVO>23.4-EVO<23.4R2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S9, 21.4R3-S10, 22.2R3-S5, 22.3R3-S4, 22.4R3-S3, 23.2R2-S2, 23.4R2, 24.2R1, and all subsequent releases. Junos OS Evolved: 21.2R3-S9-EVO, 21.4R3-S10-EVO, 22.2R3-S5-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S2-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21593 has been classified with a high severity rating due to its potential to cause Denial-of-Service (DoS) through network-based attacks.
To mitigate CVE-2025-21593, upgrade to the latest patched version of Junos OS or Junos OS Evolved as recommended by Juniper Networks.
CVE-2025-21593 affects various versions of Juniper Networks Junos OS and Junos OS Evolved, specifically versions up to 21.2R3-S9 and 21.2R3-S9-EVO.
Yes, CVE-2025-21593 can be exploited by an unauthenticated network-based attacker.
If exploited, CVE-2025-21593 could lead to a Denial-of-Service (DoS), causing affected devices to become unavailable.