Skip to main content

CVE-2025-52951: CWE-693: Protection Mechanism Failure in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2025-52951cvecve-2025-52951cwe-693
Published: Fri Jul 11 2025 (07/11/2025, 14:41:03 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Protection Mechanism Failure vulnerability in kernel filter processing of Juniper Networks Junos OS allows an attacker sending IPv6 traffic to an interface to effectively bypass any firewall filtering configured on the interface. Due to an issue with Junos OS kernel filter processing, the 'payload-protocol' match is not being supported, causing any term containing it to accept all packets without taking any other action. In essence, these firewall filter terms were being processed as an 'accept' for all traffic on the interface. This issue affects Junos OS:  * all versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S11,  * from 22.2 before 22.2R3-S7,  * from 22.4 before 22.4R3-S7,  * from 23.2 before 23.2R2-S4,  * from 23.4 before 23.4R2-S5,  * from 24.2 before 24.2R2-S1,  * from 24.4 before 24.4R1-S2, 24.4R2. This is a more complete fix for previously published CVE-2024-21607 (JSA75748).

AI-Powered Analysis

AILast updated: 07/11/2025, 15:16:42 UTC

Technical Analysis

CVE-2025-52951 is a vulnerability classified under CWE-693 (Protection Mechanism Failure) affecting Juniper Networks Junos OS. The issue arises from a flaw in the kernel filter processing related to IPv6 traffic. Specifically, the 'payload-protocol' match condition in firewall filter terms is not properly supported. As a result, any firewall filter term containing 'payload-protocol' is effectively bypassed, causing the filter to accept all packets regardless of the intended filtering rules. This means that an attacker can send crafted IPv6 packets to an interface running a vulnerable version of Junos OS and bypass firewall filtering configured on that interface. The vulnerability affects multiple Junos OS versions, including all versions before 21.2R3-S9, and various versions from 21.4 up to 24.4R2, spanning releases from 2021 through 2025. This vulnerability is a more complete fix following the previously published CVE-2024-21607, indicating ongoing issues with the kernel filter processing. The CVSS v3.1 base score is 5.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), scope changed (S:C), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No known exploits are currently reported in the wild. The vulnerability allows an attacker to bypass firewall rules, potentially enabling unauthorized network traffic to pass through protected interfaces, undermining network segmentation and security policies.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for those relying on Juniper Networks Junos OS for routing and firewall functions. The ability to bypass firewall filtering on IPv6 traffic can lead to unauthorized access, lateral movement within networks, and exposure of internal systems to external threats. Given the increasing adoption of IPv6 in Europe, this vulnerability could be exploited to circumvent security controls, potentially leading to data integrity issues or enabling further attacks such as reconnaissance or exploitation of other vulnerabilities. Critical infrastructure providers, financial institutions, and large enterprises using Junos OS in their network infrastructure could face increased risk of targeted attacks or data breaches. The lack of confidentiality impact reduces the risk of direct data leakage, but the integrity impact means attackers could manipulate or inject malicious traffic, disrupting normal operations or enabling further compromise. The medium severity rating suggests a moderate but non-trivial threat that requires timely remediation to prevent exploitation.

Mitigation Recommendations

European organizations should prioritize upgrading affected Junos OS versions to the fixed releases starting from 21.2R3-S9 and equivalent patches in later versions as indicated by Juniper Networks. Network administrators must audit firewall filter configurations to identify and remove or replace any terms using the 'payload-protocol' match condition until patches are applied. Implementing additional layers of security such as IPv6-specific intrusion detection/prevention systems (IDS/IPS) can help detect anomalous traffic that bypasses firewall filters. Network segmentation and strict access controls should be enforced to limit the potential impact of any bypassed firewall rules. Monitoring network traffic for unusual IPv6 packets and establishing alerting mechanisms for suspicious activity can provide early warning of exploitation attempts. Organizations should also review and update their incident response plans to include scenarios involving firewall bypass via IPv6 traffic. Finally, coordination with Juniper Networks support and subscribing to their security advisories will ensure timely awareness of any further updates or exploit developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T13:16:01.409Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68712732a83201eaacaf3f92

Added to database: 7/11/2025, 3:01:06 PM

Last enriched: 7/11/2025, 3:16:42 PM

Last updated: 7/11/2025, 4:08:17 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats