First published: Wed Apr 09 2025(Updated: )
An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it's sent to SRRD it's encoded incorrectly which leads to a crash and momentary interruption of jflow processing until it automatically restarts. This issue does not affect traffic forwarding itself. This issue affects Junos OS: * All versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R1-S2, 23.2R2. This issue does not affected Junos OS Evolved.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | <21.2R3-S9<21.4R3-S10<22.2R3-S6<22.4R3<23.2R1-S2<23.2R2 |
The following software releases have been updated to resolve this specific issue: 21.2R3-S9, 21.4R3-S10, 22.2R3-S6, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30657 is classified as critical due to its potential to cause a Denial-of-Service (DoS).
To fix CVE-2025-30657, update your Junos OS to the latest patched version as recommended by Juniper Networks.
CVE-2025-30657 affects Junos OS versions up to 21.2R3-S9, 21.4R3-S10, 22.2R3-S6, 22.4R3, 23.2R1-S2, and 23.2R2.
CVE-2025-30657 can facilitate a Denial-of-Service (DoS) attack by allowing unauthenticated network-based attackers to disrupt service.
No, CVE-2025-30657 can be exploited by unauthenticated attackers, making it particularly dangerous.