Skip to main content

CVE-2025-52953: CWE-440 Expected Behavior Violation in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2025-52953cvecve-2025-52953cwe-440
Published: Fri Jul 11 2025 (07/11/2025, 15:04:55 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS).  Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S11, * from 22.2 before 22.2R3-S7, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S4, * from 24.2 before 24.2R2, * from 24.4 before 24.4R1-S3, 24.4R2 Junos OS Evolved: * All versions before 22.2R3-S7-EVO, * from 22.4-EVO before 22.4R3-S7-EVO, * from 23.2-EVO before 23.2R2-S4-EVO, * from 23.4-EVO before 23.4R2-S4-EVO, * from 24.2-EVO before 24.2R2-EVO, * from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO.

AI-Powered Analysis

AILast updated: 07/11/2025, 15:32:46 UTC

Technical Analysis

CVE-2025-52953 is a medium severity vulnerability identified in the routing protocol daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability is classified as CWE-440, which refers to an Expected Behavior Violation. Specifically, an unauthenticated attacker who is adjacent on the network can send a specially crafted valid BGP UPDATE packet to a vulnerable Junos OS device. This packet triggers a BGP session reset, causing a Denial of Service (DoS) condition. The vulnerability affects both iBGP and eBGP sessions and impacts IPv4 and IPv6 routing protocols. The issue arises because the rpd process does not correctly handle certain BGP UPDATE packets, violating expected protocol behavior and leading to session disruption. Continuous exploitation by repeatedly sending such packets can sustain the DoS condition, effectively disrupting network routing and connectivity. The affected versions span multiple releases of Junos OS and Junos OS Evolved, including all versions before 21.2R3-S9 and various subsequent versions up to 24.4R2-EVO, indicating a broad impact across many currently deployed Juniper devices. The CVSS v3.1 base score is 6.5, reflecting a medium severity level with an attack vector of adjacent network access, low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity impact). No known exploits are currently reported in the wild, but the vulnerability could be leveraged by attackers with network adjacency to disrupt routing infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure stability, particularly for enterprises, ISPs, and data centers relying on Juniper Networks routers running vulnerable Junos OS versions. Disruption of BGP sessions can lead to routing instability, loss of connectivity, and potential outages affecting critical business operations and internet services. Given the importance of BGP in managing internet and internal routing, sustained DoS conditions could degrade service availability, impacting financial institutions, government networks, telecommunications providers, and cloud service operators across Europe. The lack of confidentiality or integrity impact limits data breach risks, but availability degradation can have cascading effects on dependent services and critical infrastructure. Organizations with multi-homed networks or those using Juniper devices for border routing are particularly vulnerable. The attack requires adjacency, so exposure is higher in environments where BGP peers are reachable by untrusted or semi-trusted networks, such as internet exchange points or poorly segmented internal networks.

Mitigation Recommendations

European organizations should prioritize upgrading Juniper devices to fixed versions as listed by Juniper Networks, ensuring deployment of patches for both Junos OS and Junos OS Evolved. Network administrators should audit BGP peer configurations to restrict adjacency to trusted and authenticated peers only, employing BGP session authentication mechanisms such as TCP MD5 signatures or TCP-AO where supported. Implement strict network segmentation and access control lists (ACLs) to limit which devices can send BGP UPDATE packets to routing devices. Monitoring and alerting on abnormal BGP session resets and unusual BGP UPDATE traffic patterns can provide early detection of exploitation attempts. Additionally, organizations should consider deploying BGP session protection features and rate limiting on BGP control plane traffic to mitigate the impact of repeated malicious packets. Regular vulnerability scanning and configuration reviews should be conducted to ensure no legacy or unsupported versions remain in production. Finally, incident response plans should include procedures for rapid remediation of routing disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T13:16:01.409Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68712ab6a83201eaacaf47ef

Added to database: 7/11/2025, 3:16:06 PM

Last enriched: 7/11/2025, 3:32:46 PM

Last updated: 8/9/2025, 2:46:31 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats