First published: Thu Jan 09 2025(Updated: )
A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service. Receipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS). Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition. This issue only affects systems configured with IPv6. This issue affects Junos OS Evolved: * from 22.4-EVO before 22.4R3-S5-EVO, * from 23.2-EVO before 23.2R2-S2-EVO, * from 23.4-EVO before 23.4R2-S2-EVO, * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | >22.4R1-EVO>=22.4-EVO<22.4R3-S5-EVO>=23.2-EVO<23.2R2-S2-EVO>=23.4-EVO<23.4R2-S2-EVO>=24.2-EVO<24.2R1-S2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 22.4R3-S5-EVO, 23.2R2-S2-EVO, 23.4R2-S2-EVO, 24.2R1-S2-EVO, 24.2R2-EVO*, 24.4R1-EVO, and all subsequent releases. * Future Release
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21599 is classified as a high severity vulnerability due to its potential to cause Denial of Service.
To fix CVE-2025-21599, upgrade to the latest version of Junos OS Evolved that addresses this vulnerability.
CVE-2025-21599 affects users of Juniper Networks Junos OS Evolved versions 22.4R1-EVO through 24.2-EVO.
CVE-2025-21599 allows unauthenticated network-based attackers to conduct Denial of Service attacks.
CVE-2025-21599 is triggered by the receipt of specifically malformed IPv6 packets.