CVE-2025-52980: CWE-198 Use of Incorrect Byte Ordering in Juniper Networks Junos OS
A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart. This issue affects eBGP and iBGP over IPv4 and IPv6. This issue affects: Junos OS: * 22.1 versions from 22.1R1 before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2, * 23.4 versions before 23.4R2.
AI Analysis
Technical Summary
CVE-2025-52980 is a high-severity vulnerability affecting the Routing Protocol Daemon (rpd) component of Juniper Networks Junos OS, specifically on SRX300 Series devices. The vulnerability arises from the use of incorrect byte ordering (CWE-198) when processing BGP updates containing a specific, valid, optional, transitive path attribute. When such a crafted BGP update is received over an established BGP session—applicable to both eBGP and iBGP over IPv4 and IPv6—the rpd process crashes and subsequently restarts, causing a Denial-of-Service (DoS) condition. This vulnerability does not require authentication, user interaction, or elevated privileges, and can be exploited remotely over the network by an unauthenticated attacker. Affected Junos OS versions include 22.1 (from 22.1R1 up to but not including 22.2R3-S4), 22.3 (before 22.3R3-S3), 22.4 (before 22.4R3-S2), 23.2 (before 23.2R2), and 23.4 (before 23.4R2). The vulnerability impacts the availability of routing services by causing rpd crashes, which can disrupt network traffic and routing stability. No known exploits are currently reported in the wild, and no patches are linked in the provided information, though Juniper Networks is expected to release updates addressing this issue. The vulnerability’s CVSS v3.1 score is 7.5 (high), reflecting its network attack vector, low complexity, no privileges or user interaction required, and impact limited to availability without affecting confidentiality or integrity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability, particularly for enterprises, service providers, and critical infrastructure operators relying on Juniper SRX300 Series devices for routing and firewall functions. A successful exploitation can cause repeated crashes of the routing daemon, leading to intermittent or prolonged network outages, degraded performance, and potential loss of connectivity between sites or to the internet. This could disrupt business operations, impact service level agreements, and affect critical communications. In sectors such as finance, healthcare, telecommunications, and government, where network availability is paramount, such disruptions could have cascading effects on operational continuity and regulatory compliance. Additionally, the vulnerability affects both IPv4 and IPv6 BGP sessions, broadening the scope of potential impact in modern dual-stack networks. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can be severe, especially in environments with limited redundancy or where rapid failover is not configured.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Inventory and identify all Juniper SRX300 Series devices running affected Junos OS versions; 2) Apply vendor-provided patches or software updates as soon as they become available to remediate the vulnerability; 3) In the interim, implement network-level controls such as BGP session filtering and validation to restrict BGP updates to trusted peers only, minimizing exposure to malicious or malformed BGP path attributes; 4) Employ BGP session protection mechanisms like TTL security checks and prefix filtering to reduce the risk of unauthorized BGP updates; 5) Monitor rpd process stability and BGP session health closely using network management and logging tools to detect anomalous crashes or restarts promptly; 6) Consider deploying redundant routing paths and failover configurations to maintain network availability in case of rpd crashes; 7) Engage with Juniper Networks support for guidance and to obtain any available interim workarounds; 8) Review and update incident response plans to include scenarios involving routing daemon failures and network outages caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-52980: CWE-198 Use of Incorrect Byte Ordering in Juniper Networks Junos OS
Description
A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart. This issue affects eBGP and iBGP over IPv4 and IPv6. This issue affects: Junos OS: * 22.1 versions from 22.1R1 before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2, * 23.4 versions before 23.4R2.
AI-Powered Analysis
Technical Analysis
CVE-2025-52980 is a high-severity vulnerability affecting the Routing Protocol Daemon (rpd) component of Juniper Networks Junos OS, specifically on SRX300 Series devices. The vulnerability arises from the use of incorrect byte ordering (CWE-198) when processing BGP updates containing a specific, valid, optional, transitive path attribute. When such a crafted BGP update is received over an established BGP session—applicable to both eBGP and iBGP over IPv4 and IPv6—the rpd process crashes and subsequently restarts, causing a Denial-of-Service (DoS) condition. This vulnerability does not require authentication, user interaction, or elevated privileges, and can be exploited remotely over the network by an unauthenticated attacker. Affected Junos OS versions include 22.1 (from 22.1R1 up to but not including 22.2R3-S4), 22.3 (before 22.3R3-S3), 22.4 (before 22.4R3-S2), 23.2 (before 23.2R2), and 23.4 (before 23.4R2). The vulnerability impacts the availability of routing services by causing rpd crashes, which can disrupt network traffic and routing stability. No known exploits are currently reported in the wild, and no patches are linked in the provided information, though Juniper Networks is expected to release updates addressing this issue. The vulnerability’s CVSS v3.1 score is 7.5 (high), reflecting its network attack vector, low complexity, no privileges or user interaction required, and impact limited to availability without affecting confidentiality or integrity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability, particularly for enterprises, service providers, and critical infrastructure operators relying on Juniper SRX300 Series devices for routing and firewall functions. A successful exploitation can cause repeated crashes of the routing daemon, leading to intermittent or prolonged network outages, degraded performance, and potential loss of connectivity between sites or to the internet. This could disrupt business operations, impact service level agreements, and affect critical communications. In sectors such as finance, healthcare, telecommunications, and government, where network availability is paramount, such disruptions could have cascading effects on operational continuity and regulatory compliance. Additionally, the vulnerability affects both IPv4 and IPv6 BGP sessions, broadening the scope of potential impact in modern dual-stack networks. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can be severe, especially in environments with limited redundancy or where rapid failover is not configured.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Inventory and identify all Juniper SRX300 Series devices running affected Junos OS versions; 2) Apply vendor-provided patches or software updates as soon as they become available to remediate the vulnerability; 3) In the interim, implement network-level controls such as BGP session filtering and validation to restrict BGP updates to trusted peers only, minimizing exposure to malicious or malformed BGP path attributes; 4) Employ BGP session protection mechanisms like TTL security checks and prefix filtering to reduce the risk of unauthorized BGP updates; 5) Monitor rpd process stability and BGP session health closely using network management and logging tools to detect anomalous crashes or restarts promptly; 6) Consider deploying redundant routing paths and failover configurations to maintain network availability in case of rpd crashes; 7) Engage with Juniper Networks support for guidance and to obtain any available interim workarounds; 8) Review and update incident response plans to include scenarios involving routing daemon failures and network outages caused by this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2025-06-23T18:23:44.545Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68712e3ba83201eaacaf5d0b
Added to database: 7/11/2025, 3:31:07 PM
Last enriched: 7/18/2025, 8:50:16 PM
Last updated: 8/16/2025, 8:37:17 AM
Views: 27
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.