First published: Wed Apr 09 2025(Updated: )
An Improper Handling of Length Parameter Inconsistency vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a device configured for Secure Vector Routing (SVR) receives a specifically malformed packet the PFE will crash and restart. This issue affects Junos OS on SRX Series: * All 21.4 versions, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2. This issue does not affect versions before 21.4.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =21.4<22.2R3-S6<22.4R3-S6<23.2R2-S3<23.4R2-S4<24.2R2 |
The following software releases have been updated to resolve this specific issue: 22.2R3-S6, 22.4R3-S6, 23.2R2-S3, 23.4R2-S4, 24.2R2, 24.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30659 has been rated as a critical severity vulnerability due to its potential to cause a Denial-of-Service attack.
To fix CVE-2025-30659, update affected Junos OS to the latest version that is not vulnerable.
CVE-2025-30659 affects devices running Junos OS versions 21.4 and below up to versions 22.2R3-S6, 22.4R3-S6, 23.2R2-S3, 23.4R2-S4, and 24.2R2.
CVE-2025-30659 is classified as an Improper Handling of Length Parameter Inconsistency vulnerability.
Yes, CVE-2025-30659 can be exploited by unauthenticated, network-based attackers to affect the availability of the system.