Skip to main content

CVE-2025-52984: CWE-476 NULL Pointer Dereference in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2025-52984cvecve-2025-52984cwe-476
Published: Fri Jul 11 2025 (07/11/2025, 15:09:37 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device. When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts. This issue affects: Junos OS:  * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10,  * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R1-S2, 24.2R2; Junos OS Evolved: * all versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S3-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO.

AI-Powered Analysis

AILast updated: 07/18/2025, 20:51:13 UTC

Technical Analysis

CVE-2025-52984 is a medium-severity vulnerability classified as CWE-476 (NULL Pointer Dereference) affecting Juniper Networks Junos OS and Junos OS Evolved. The flaw resides in the routing protocol daemon (rpd), a critical component responsible for routing decisions and protocol management. Specifically, when a static route is configured with a reject next hop and a gNMI (gRPC Network Management Interface) query is processed for that static route, the rpd process dereferences a NULL pointer, causing it to crash and subsequently restart. This results in a temporary denial of service affecting the availability of the network device. The vulnerability can be triggered remotely by an unauthenticated attacker over the network, requiring no user interaction, but exploitation complexity is rated high due to the specific conditions needed (static route with reject next hop and gNMI query). The affected Junos OS versions include all releases prior to 21.2R3-S9, 21.4 versions before 21.4R3-S10, 22.2 versions before 22.2R3-S6, 22.4 versions before 22.4R3-S6, 23.2 versions before 23.2R2-S3, 23.4 versions before 23.4R2-S4, and 24.2 versions before 24.2R1-S2 and 24.2R2. Similarly, Junos OS Evolved versions prior to 22.4R3-S7-EVO, 23.2R2-S3-EVO, 23.4R2-S4-EVO, and 24.2R2-EVO are affected. No known exploits are currently in the wild, but the vulnerability poses a risk to network availability due to the potential for repeated rpd crashes and restarts, which can disrupt routing and network stability. The CVSS v3.1 base score is 5.9, reflecting a medium severity with network attack vector, no privileges required, no user interaction, and impact limited to availability only.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure stability, particularly for enterprises, service providers, and critical infrastructure operators relying on Juniper Networks devices running Junos OS or Junos OS Evolved. The rpd daemon is central to routing operations; its crash and restart can cause transient routing outages, packet loss, and network instability. This can impact business continuity, especially for organizations with high availability requirements such as financial institutions, telecommunications providers, and government agencies. The unauthenticated, remote nature of the attack vector increases the threat surface, as attackers do not need credentials or user interaction to trigger the issue. While the vulnerability does not allow data compromise or integrity manipulation, the availability impact can disrupt services and potentially cascade into broader operational issues. Given the widespread use of Juniper devices in European network backbones and enterprise environments, the vulnerability could be leveraged in targeted denial-of-service campaigns or as part of multi-stage attacks aiming to degrade network defenses.

Mitigation Recommendations

Organizations should prioritize upgrading affected Junos OS and Junos OS Evolved devices to the fixed versions listed by Juniper Networks as soon as possible. In the interim, network administrators should audit routing configurations to identify static routes with reject next hops and consider temporarily removing or modifying these routes to avoid triggering the vulnerability. Limiting or restricting gNMI access to trusted management networks and enforcing strict access controls can reduce exposure. Deploying network segmentation to isolate management interfaces and monitoring for unusual gNMI queries or rpd process restarts can help detect exploitation attempts. Additionally, implementing redundancy and failover mechanisms for critical routing devices can mitigate the impact of transient outages caused by rpd crashes. Regularly reviewing Juniper security advisories and applying patches promptly is essential to maintain network resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T18:23:44.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68712e3ba83201eaacaf5d18

Added to database: 7/11/2025, 3:31:07 PM

Last enriched: 7/18/2025, 8:51:13 PM

Last updated: 8/18/2025, 7:58:20 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats