Skip to main content

CVE-2025-52951: CWE-693: Protection Mechanism Failure in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2025-52951cvecve-2025-52951cwe-693
Published: Fri Jul 11 2025 (07/11/2025, 14:41:03 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Protection Mechanism Failure vulnerability in kernel filter processing of Juniper Networks Junos OS allows an attacker sending IPv6 traffic destined to the device to effectively bypass any firewall filtering configured on the interface. Due to an issue with Junos OS kernel filter processing, the 'payload-protocol' match is not being supported, causing any term containing it to accept all packets without taking any other action. In essence, these firewall filter terms were being processed as an 'accept' for all traffic on the interface destined for the control plane, even when used in combination with other match criteria. This issue only affects firewall filters protecting the device's control plane. Transit firewall filtering is unaffected by this vulnerability. This issue affects Junos OS:  * all versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S11,  * from 22.2 before 22.2R3-S7,  * from 22.4 before 22.4R3-S7,  * from 23.2 before 23.2R2-S4,  * from 23.4 before 23.4R2-S5,  * from 24.2 before 24.2R2-S1,  * from 24.4 before 24.4R1-S2, 24.4R2. This is a more complete fix for previously published CVE-2024-21607 (JSA75748).

AI-Powered Analysis

AILast updated: 07/18/2025, 20:54:16 UTC

Technical Analysis

CVE-2025-52951 is a medium-severity vulnerability affecting Juniper Networks Junos OS, specifically related to a Protection Mechanism Failure (CWE-693) in the kernel filter processing of IPv6 traffic destined for the device's control plane. The vulnerability arises because the 'payload-protocol' match criterion in firewall filters is not properly supported by the Junos OS kernel filter processing. As a result, any firewall filter term containing 'payload-protocol' is effectively treated as an unconditional accept rule for all packets destined to the control plane interface, regardless of other match criteria. This means that firewall filters intended to protect the control plane can be bypassed entirely when IPv6 traffic is sent to the device, allowing potentially malicious packets to reach the control plane unfiltered. Importantly, this issue does not affect transit firewall filtering, only filters protecting the device itself. The vulnerability impacts multiple versions of Junos OS, including all versions before 21.2R3-S9 and various subsequent releases up to 24.4R2. This vulnerability is a more complete fix following the previously published CVE-2024-21607. The CVSS v3.1 base score is 5.8 (medium), with an attack vector of network, low attack complexity, no privileges required, no user interaction, and a scope change. The impact is limited to integrity, as the attacker can bypass firewall filtering but cannot directly affect confidentiality or availability. No known exploits are reported in the wild as of the publication date. This vulnerability requires an attacker to send crafted IPv6 packets to the device, exploiting the kernel filter processing flaw to bypass control plane firewall filters and potentially perform unauthorized actions or reconnaissance on the device's control plane services.

Potential Impact

For European organizations, the impact of CVE-2025-52951 can be significant, especially for those relying on Juniper Networks Junos OS devices to secure their network infrastructure. The ability to bypass control plane firewall filters means attackers can potentially send malicious IPv6 traffic directly to the device's control plane, which could lead to unauthorized access to management interfaces, reconnaissance, or manipulation of control plane protocols. This undermines the security posture of critical network infrastructure, increasing the risk of further exploitation or lateral movement within the network. Since the vulnerability does not affect transit filtering, the risk is primarily to the device itself rather than traffic passing through it. However, compromised control plane security can lead to device misconfiguration, denial of management access, or indirect impacts on network stability. European organizations with IPv6-enabled networks and Junos OS devices in their core or edge infrastructure are particularly at risk. The medium severity rating suggests that while the vulnerability is exploitable remotely without authentication, the impact is limited to integrity and does not directly cause denial of service or data leakage. Nonetheless, the strategic importance of network infrastructure in sectors such as finance, telecommunications, government, and critical infrastructure in Europe elevates the potential consequences of exploitation.

Mitigation Recommendations

To mitigate CVE-2025-52951, European organizations should take the following specific actions: 1) Immediately identify all Juniper Networks devices running affected versions of Junos OS, focusing on those with IPv6 enabled and firewall filters protecting the control plane. 2) Apply the latest security patches and updates from Juniper Networks that address this vulnerability. Since the advisory lists fixed versions starting from 21.2R3-S9 and subsequent releases, upgrading to these or later patched versions is critical. 3) Review and audit firewall filter configurations that use the 'payload-protocol' match criterion on control plane interfaces. Where possible, avoid using 'payload-protocol' in control plane filters until patched, or implement alternative filtering strategies that do not rely on this match. 4) Implement additional network segmentation and monitoring to detect anomalous IPv6 traffic targeting control plane interfaces. 5) Employ strict access control and management plane protection mechanisms such as management VRFs, ACLs, and control plane policing to limit exposure. 6) Monitor vendor advisories and threat intelligence feeds for any emerging exploits or indicators of compromise related to this vulnerability. 7) Conduct penetration testing and vulnerability assessments focusing on IPv6 control plane filtering to validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T13:16:01.409Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68712732a83201eaacaf3f92

Added to database: 7/11/2025, 3:01:06 PM

Last enriched: 7/18/2025, 8:54:16 PM

Last updated: 8/21/2025, 3:29:57 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats