Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30644: CWE-122 Heap-based Buffer Overflow in Juniper Networks Junos OS

0
High
VulnerabilityCVE-2025-30644cvecve-2025-30644cwe-122
Published: Wed Apr 09 2025 (04/09/2025, 19:52:16 UTC)
Source: CVE
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series allows an attacker to send a specific DHCP packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Under a rare timing scenario outside the attacker's control, memory corruption may be observed when DHCP Option 82 is enabled, leading to an FPC crash and affecting packet forwarding. Due to the nature of the heap-based overflow, exploitation of this vulnerability could also lead to remote code execution within the FPC, resulting in complete control of the vulnerable component. This issue affects Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series: * All versions before 21.4R3-S9,  * from 22.2 before 22.2R3-S5,  * from 22.4 before 22.4R3-S5,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S3,  * from 24.2 before 24.2R2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:17:34 UTC

Technical Analysis

CVE-2025-30644 is a critical heap-based buffer overflow vulnerability identified in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS, impacting a broad range of EX and QFX series switches including EX2300 through EX4650-48Y and QFX5k series. The vulnerability arises from improper handling of DHCP packets, specifically crafted to exploit the heap overflow condition. When an attacker sends a malicious DHCP packet, the FPC component can crash and restart, causing a Denial of Service (DoS) condition. This DoS can be sustained if the attacker continues sending the crafted packets. Additionally, under a rare timing scenario involving DHCP Option 82, memory corruption may occur, which can lead to more severe consequences such as remote code execution (RCE) within the FPC. Successful exploitation of RCE would grant an attacker complete control over the vulnerable FPC component, potentially allowing manipulation of packet forwarding and other critical network functions. The vulnerability affects multiple Junos OS versions before 21.4R3-S9, 22.2 before 22.2R3-S5, 22.4 before 22.4R3-S5, 23.2 before 23.2R2-S3, 23.4 before 23.4R2-S3, and 24.2 before 24.2R2. The CVSS 3.1 base score is 7.5, indicating high severity with network attack vector (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits have been reported in the wild yet, but the potential for remote code execution elevates the risk profile significantly. Juniper Networks has published advisories and patches for affected versions, though patch links were not provided in the source data. This vulnerability is particularly concerning for organizations relying on Juniper EX and QFX series switches in their network infrastructure, as exploitation could disrupt network operations and compromise device integrity.

Potential Impact

The impact of CVE-2025-30644 is significant for organizations using affected Juniper Networks switches, as it can cause sustained Denial of Service (DoS) conditions by crashing the flexible PIC concentrator (FPC), disrupting network availability and potentially causing outages. More critically, under certain conditions, the vulnerability may allow remote code execution (RCE) on the FPC, granting attackers full control over this critical network component. This could lead to manipulation of network traffic, interception or modification of data, and persistent compromise of network infrastructure. The high severity score reflects the broad impact on confidentiality, integrity, and availability. Organizations in sectors with high dependency on network uptime and security—such as telecommunications, finance, government, and large enterprises—face elevated risks. The requirement for network access and high attack complexity somewhat limits the ease of exploitation, but the potential consequences warrant urgent attention. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

1. Apply Juniper Networks’ security patches and updates for Junos OS versions affected by CVE-2025-30644 as soon as they become available. Regularly monitor Juniper’s security advisories for updates. 2. If immediate patching is not feasible, implement network-level controls to restrict or filter DHCP traffic to trusted sources only, minimizing exposure to crafted DHCP packets. 3. Disable DHCP Option 82 if it is not required in your network environment, as its enablement is linked to increased risk of memory corruption exploitation. 4. Employ network segmentation and access control lists (ACLs) to limit access to management and control plane interfaces of affected devices, reducing the attack surface. 5. Monitor network devices for unusual crashes, restarts, or anomalous DHCP traffic patterns that could indicate exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on network infrastructure to identify potential weaknesses. 7. Maintain comprehensive backups and incident response plans to quickly recover from potential DoS or compromise events. 8. Educate network operations teams about this vulnerability and ensure rapid response procedures are in place.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-03-24T19:34:11.320Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd8fd4

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 2/26/2026, 9:17:34 PM

Last updated: 3/22/2026, 5:10:34 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses