Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52954: CWE-862 Missing Authorization in Juniper Networks Junos OS Evolved

0
High
VulnerabilityCVE-2025-52954cvecve-2025-52954cwe-862
Published: Fri Jul 11 2025 (07/11/2025, 14:42:02 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS Evolved

Description

A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise. Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system.  This issue affects Junos OS Evolved:  * All versions before 22.2R3-S7-EVO,  * from 22.4 before 22.4R3-S7-EVO,  * from 23.2 before 23.2R2-S4-EVO,  * from 23.4 before 23.4R2-S5-EVO,  * from 24.2 before 24.2R2-S1-EVO * from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:14:55 UTC

Technical Analysis

CVE-2025-52954 is a missing authorization vulnerability (CWE-862) in Juniper Networks Junos OS Evolved that affects multiple versions before specific patched releases starting from 22.2R3-S7-EVO and continuing through 24.4R2-EVO. The flaw resides in the internal virtual routing and forwarding (VRF) mechanism, which is designed to isolate network traffic internally. A local attacker with low privileges who can send packets over the internal VRF can exploit this vulnerability to execute arbitrary Junos commands. This unauthorized command execution allows the attacker to modify system configurations and escalate privileges to root, resulting in full system compromise. The vulnerability does not require user interaction but does require local access and the ability to interact with the internal VRF. The CVSS v3.1 base score is 7.8, reflecting high severity with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation by a local low-privileged user makes this a critical concern for organizations relying on Junos OS Evolved for network routing and security functions.

Potential Impact

The impact of CVE-2025-52954 is significant for organizations using Juniper Networks Junos OS Evolved in their network infrastructure. Successful exploitation leads to full system compromise with root privileges, allowing attackers to alter routing configurations, disrupt network traffic, and potentially pivot to other internal systems. This can result in data breaches, network outages, and loss of control over critical network devices. Given Junos OS Evolved's deployment in service provider, enterprise, and data center environments, the vulnerability poses a risk to the confidentiality, integrity, and availability of network operations globally. Attackers with local access could leverage this flaw to establish persistent presence, intercept or redirect traffic, and disable security controls, severely impacting business continuity and trust.

Mitigation Recommendations

To mitigate CVE-2025-52954, organizations should: 1) Immediately apply the official patches provided by Juniper Networks for all affected Junos OS Evolved versions as listed in the advisory. 2) Restrict local access to devices running Junos OS Evolved, especially limiting access to the internal VRF interfaces to trusted administrators only. 3) Implement strict network segmentation and access controls to prevent unauthorized users from sending packets over the internal VRF. 4) Monitor system logs and network traffic for unusual command executions or configuration changes indicative of exploitation attempts. 5) Employ multi-factor authentication and role-based access controls to reduce the risk of privilege escalation. 6) Conduct regular security audits and vulnerability assessments on network devices to identify and remediate potential weaknesses. 7) Maintain an incident response plan tailored to network device compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T13:16:01.410Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68712732a83201eaacaf3f95

Added to database: 7/11/2025, 3:01:06 PM

Last enriched: 2/27/2026, 3:14:55 AM

Last updated: 3/22/2026, 5:18:29 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses