First published: Thu Jan 09 2025(Updated: )
An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system. This issue affects Junos OS on SRX1500, SRX4100, SRX4200: * All versions before 21.4R3-S9, * from 22.2 before 22.2R3-S5, * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S4, * from 23.2 before 23.2R2-S3, * from 23.4 before 23.4R2-S1.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.4R3-S9>22.2<undefined>22.3<undefined>22.4<undefined>23.2<undefined>23.4<undefined |
The following software releases have been updated to resolve this specific issue: 21.4R3-S9, 22.2R3-S5, 22.3R3-S4, 22.4R3-S4, 23.2R2-S3, 23.4R2-S1, 24.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21596 is classified as a medium severity vulnerability.
To mitigate CVE-2025-21596, update the Junos OS to versions that are not affected, specifically versions 21.4R3-S9 or newer.
CVE-2025-21596 affects local, low-privileged authenticated users on Juniper Networks SRX1500, SRX4100, and SRX4200 devices running specific versions of Junos OS.
CVE-2025-21596 allows a low-privileged authenticated attacker to exploit the command-line processing to cause a denial of service.
CVE-2025-21596 was published on March 1, 2025.