First published: Thu Jan 09 2025(Updated: )
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability. This issue affects Junos OS: * from 21.4 before 21.4R3-S9, * from 22.2 before 22.2R3-S5, * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S5, * from 23.2 before 23.2R2-S3, * from 23.4 before 23.4R2-S3, * from 24.2 before 24.2R1-S2, 24.2R2; This issue does not affect versions prior to 21.1R1. Junos OS Evolved: * from 21.4 before 21.4R3-S9-EVO, * from 22.2 before 22.2R3-S5-EVO, * from 22.3 before 22.3R3-S4-EVO, * from 22.4 before 22.4R3-S5-EVO, * from 23.2 before 23.2R2-S3-EVO, * from 23.4 before 23.4R2-S3-EVO, * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO. This issue does not affect versions prior to 21.1R1-EVO
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | >=undefined<21.4R3-S9>=undefined<22.2R3-S5>=undefined<22.3R3-S4>=undefined<22.4R3-S5>=undefined<23.2R2-S3>=undefined<23.4R2-S3>=undefined<24.2R1-S2 | |
Juniper Networks Junos OS | >=undefined<21.4R3-S9-EVO>=undefined<22.2R3-S5-EVO>=undefined<22.3R3-S4-EVO>=undefined<22.4R3-S5-EVO>=undefined<23.2R2-S3-EVO>=undefined<23.4R2-S3-EVO>=undefined<24.2R1-S2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.4R3-S9-EVO, 22.2R3-S5-EVO, 22.3R3-S4-EVO, 22.4R3-S5-EVO, 23.2R2-S3-EVO*, 23.4R2-S3-EVO, 24.2R1-S2-EVO, 24.2R2-EVO*, 24.4R1-EVO, and all subsequent releases. Junos OS: 21.4R3-S9, 22.2R3-S5, 22.3R3-S4, 22.4R3-S5, 23.2R2-S3*, 23.4R2-S3, 24.2R1-S2, 24.2R2*, 24.4R1, and all subsequent releases. * Future Release
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21602 is rated as a critical severity vulnerability due to potential denial of service impacts.
To remediate CVE-2025-21602, update your Junos OS or Junos OS Evolved to the latest patched version as recommended by Juniper Networks.
CVE-2025-21602 affects multiple versions of Juniper Networks Junos OS and Junos OS Evolved up to specific unreleased versions.
Yes, CVE-2025-21602 can be exploited remotely by an unauthenticated adjacent attacker.
Exploiting CVE-2025-21602 can cause the routing protocol daemon (rpd) to crash and restart, leading to a denial of service.