First published: Wed Apr 09 2025(Updated: )
A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When an attacker sends a specific ICMPv6 packet to an interface with "protocols router-advertisement" configured, rpd crashes and restarts. Continued receipt of this packet will cause a sustained DoS condition. This issue only affects systems configured with IPv6. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S10, * from 22.2 before 22.2R3-S6, * from 22.4 before 22.4R3-S4, * from 23.2 before 23.2R2-S2, * from 23.4 before 23.4R2; and Junos OS Evolved: * All versions before 21.2R3-S9-EVO, * from 21.4-EVO before 21.4R3-S10-EVO, * from 22.2-EVO before 22.2R3-S6-EVO, * from 22.4-EVO before 22.4R3-S4-EVO, * from 23.2-EVO before 23.2R2-S2-EVO, * from 23.4-EVO before 23.4R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | <21.2R3-S9>=undefined<21.4R3-S10>=undefined<22.2R3-S6>=undefined<22.4R3-S4>=undefined<23.2R2-S2>=undefined<23.4R2 | |
Juniper Networks Junos OS | <21.2R3-S9-EVO>=undefined<21.4R3-S10-EVO>=undefined<22.2R3-S6-EVO>=undefined<22.4R3-S4-EVO>=undefined<23.2R2-S2-EVO>=undefined<23.4R2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S9, 21.4R3-S10, 22.2R3-S6, 22.4R3-S4, 23.2R2-S2, 23.4R2, 24.2R1, and all subsequent releases. Junos OS Evolved: 21.2R3-S9-EVO, 21.4R3-S10-EVO, 22.2R3-S6-EVO, 22.4R3-S4-EVO, 23.2R2-S2-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30651 has a severity rating that allows an unauthenticated, network-based attacker to cause a Denial of Service.
To fix CVE-2025-30651, upgrade to the latest versions of Junos OS or Junos OS Evolved as recommended by Juniper Networks for your specific platform.
CVE-2025-30651 affects Junos OS versions prior to 21.2R3-S9, 21.4R3-S10; and Junos OS Evolved versions prior to 21.2R3-S9-EVO, 21.4R3-S10-EVO.
Yes, CVE-2025-30651 can be exploited by an unauthenticated network-based attacker through specific ICMPv6 packets.
The potential impact of CVE-2025-30651 is a Denial of Service (DoS) condition on affected devices.