CVE-2025-52947: CWE-755 Improper Handling of Exceptional Conditions in Juniper Networks Junos OS
An Improper Handling of Exceptional Conditions vulnerability in route processing of Juniper Networks Junos OS on specific end-of-life (EOL) ACX Series platforms allows an attacker to crash the Forwarding Engine Board (FEB) by flapping an interface, leading to a Denial of Service (DoS). On ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096 devices, FEB0 will crash when the primary path port of the L2 circuit IGP (Interior Gateway Protocol) on the local device goes down. This issue is seen only when 'hot-standby' mode is configured for the L2 circuit. This issue affects Junos OS on ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096: * all versions before 21.2R3-S9.
AI Analysis
Technical Summary
CVE-2025-52947 is a medium-severity vulnerability affecting Juniper Networks Junos OS running on specific end-of-life ACX Series platforms, including ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096 devices. The vulnerability arises from improper handling of exceptional conditions (CWE-755) during route processing, specifically when the primary path port of the Layer 2 (L2) circuit Interior Gateway Protocol (IGP) on the local device goes down while 'hot-standby' mode is configured. This causes the Forwarding Engine Board (FEB0) to crash, resulting in a Denial of Service (DoS) condition. The issue affects all Junos OS versions prior to 21.2R3-S9 on these platforms. The vulnerability requires an attacker to cause interface flapping on the affected device, which can be done remotely but requires access to the network segment where the device operates (attack vector: adjacent network). No privileges or user interaction are required to exploit this vulnerability. The impact is limited to availability, as confidentiality and integrity are not affected. No known exploits are currently in the wild, and no patches have been linked yet, though the fixed version is 21.2R3-S9 or later. The vulnerability is particularly relevant for organizations still operating these EOL ACX Series devices with hot-standby L2 circuit configurations, as exploitation can disrupt network forwarding capabilities and cause service outages.
Potential Impact
For European organizations using Juniper ACX Series routers in their network infrastructure, especially those relying on the affected models for critical routing and switching functions, this vulnerability poses a risk of network disruption through DoS attacks. The crash of the Forwarding Engine Board can lead to loss of packet forwarding, impacting availability of network services, potentially causing outages in enterprise WANs, service provider networks, or data center interconnects. Given that the affected devices are EOL, organizations may face challenges in obtaining vendor support or patches, increasing operational risk. The attack requires adjacency to the network segment, so internal networks or managed service provider environments are more at risk than internet-facing devices. Disruption of routing can affect business continuity, especially for sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. The lack of confidentiality or integrity impact limits the risk to data breaches, but availability loss can still have significant operational and financial consequences.
Mitigation Recommendations
1. Upgrade affected Junos OS versions to 21.2R3-S9 or later where the vulnerability is fixed. If immediate upgrade is not feasible, consider network segmentation to isolate affected devices from untrusted or less secure network segments to reduce attack surface. 2. Disable 'hot-standby' mode on L2 circuits if operationally possible, as the vulnerability manifests only when this mode is enabled. 3. Monitor interface status and logs for unusual flapping behavior that could indicate exploitation attempts. 4. Implement strict access controls and network segmentation to limit adjacency access to critical Juniper ACX devices. 5. Develop incident response plans to quickly detect and recover from FEB crashes, including device reboots or failover procedures. 6. Engage with Juniper Networks support or authorized partners for guidance on patch availability and device upgrade paths given the EOL status of affected hardware. 7. Consider hardware refresh or migration to supported platforms to reduce exposure to unpatched vulnerabilities and improve long-term security posture.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Switzerland
CVE-2025-52947: CWE-755 Improper Handling of Exceptional Conditions in Juniper Networks Junos OS
Description
An Improper Handling of Exceptional Conditions vulnerability in route processing of Juniper Networks Junos OS on specific end-of-life (EOL) ACX Series platforms allows an attacker to crash the Forwarding Engine Board (FEB) by flapping an interface, leading to a Denial of Service (DoS). On ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096 devices, FEB0 will crash when the primary path port of the L2 circuit IGP (Interior Gateway Protocol) on the local device goes down. This issue is seen only when 'hot-standby' mode is configured for the L2 circuit. This issue affects Junos OS on ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096: * all versions before 21.2R3-S9.
AI-Powered Analysis
Technical Analysis
CVE-2025-52947 is a medium-severity vulnerability affecting Juniper Networks Junos OS running on specific end-of-life ACX Series platforms, including ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096 devices. The vulnerability arises from improper handling of exceptional conditions (CWE-755) during route processing, specifically when the primary path port of the Layer 2 (L2) circuit Interior Gateway Protocol (IGP) on the local device goes down while 'hot-standby' mode is configured. This causes the Forwarding Engine Board (FEB0) to crash, resulting in a Denial of Service (DoS) condition. The issue affects all Junos OS versions prior to 21.2R3-S9 on these platforms. The vulnerability requires an attacker to cause interface flapping on the affected device, which can be done remotely but requires access to the network segment where the device operates (attack vector: adjacent network). No privileges or user interaction are required to exploit this vulnerability. The impact is limited to availability, as confidentiality and integrity are not affected. No known exploits are currently in the wild, and no patches have been linked yet, though the fixed version is 21.2R3-S9 or later. The vulnerability is particularly relevant for organizations still operating these EOL ACX Series devices with hot-standby L2 circuit configurations, as exploitation can disrupt network forwarding capabilities and cause service outages.
Potential Impact
For European organizations using Juniper ACX Series routers in their network infrastructure, especially those relying on the affected models for critical routing and switching functions, this vulnerability poses a risk of network disruption through DoS attacks. The crash of the Forwarding Engine Board can lead to loss of packet forwarding, impacting availability of network services, potentially causing outages in enterprise WANs, service provider networks, or data center interconnects. Given that the affected devices are EOL, organizations may face challenges in obtaining vendor support or patches, increasing operational risk. The attack requires adjacency to the network segment, so internal networks or managed service provider environments are more at risk than internet-facing devices. Disruption of routing can affect business continuity, especially for sectors with high availability requirements such as finance, telecommunications, and critical infrastructure. The lack of confidentiality or integrity impact limits the risk to data breaches, but availability loss can still have significant operational and financial consequences.
Mitigation Recommendations
1. Upgrade affected Junos OS versions to 21.2R3-S9 or later where the vulnerability is fixed. If immediate upgrade is not feasible, consider network segmentation to isolate affected devices from untrusted or less secure network segments to reduce attack surface. 2. Disable 'hot-standby' mode on L2 circuits if operationally possible, as the vulnerability manifests only when this mode is enabled. 3. Monitor interface status and logs for unusual flapping behavior that could indicate exploitation attempts. 4. Implement strict access controls and network segmentation to limit adjacency access to critical Juniper ACX devices. 5. Develop incident response plans to quickly detect and recover from FEB crashes, including device reboots or failover procedures. 6. Engage with Juniper Networks support or authorized partners for guidance on patch availability and device upgrade paths given the EOL status of affected hardware. 7. Consider hardware refresh or migration to supported platforms to reduce exposure to unpatched vulnerabilities and improve long-term security posture.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2025-06-23T13:16:01.408Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687131bea83201eaacaf6629
Added to database: 7/11/2025, 3:46:06 PM
Last enriched: 7/11/2025, 4:01:36 PM
Last updated: 7/15/2025, 8:38:38 PM
Views: 14
Related Threats
CVE-2025-7703: CWE-287 Improper Authentication in TECNO tech.palm.id
UnknownCode Execution Through Email: How I Used Claude to Hack
MediumCVE-2025-7673: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Zyxel VMG8825-T50K firmware
CriticalCVE-2025-7359: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danielriera Counter live visitors for WooCommerce
HighCVE-2025-6747: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themefusion Avada (Fusion) Builder
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.