Skip to main content

CVE-2025-52986: CWE-401 Missing Release of Memory after Effective Lifetime in Juniper Networks Junos OS

Medium
VulnerabilityCVE-2025-52986cvecve-2025-52986cwe-401
Published: Fri Jul 11 2025 (07/11/2025, 15:10:20 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart. The leak can be monitored with the CLI command: show task memory detail | match task_shard_mgmt_cookie where the allocated memory in bytes can be seen to continuously increase with each exploitation. This issue affects: Junos OS: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S11, * 22.2 versions before 22.2R3-S7, * 22.4 versions before 22.4R3-S7, * 23.2 versions before 23.2R2-S4,  * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2, * 24.4 versions before 24.4R1-S2, 24.4R2; Junos OS Evolved: * all versions before 22.2R3-S7-EVO * 22.4-EVO versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO,  * 24.4-EVO versions before 24.4R2-EVO.

AI-Powered Analysis

AILast updated: 07/11/2025, 15:47:37 UTC

Technical Analysis

CVE-2025-52986 is a medium-severity vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved, specifically within the routing protocol daemon (rpd). The vulnerability is classified as CWE-401, indicating a Missing Release of Memory after Effective Lifetime, commonly known as a memory leak. This flaw occurs when RIB (Routing Information Base) sharding is enabled and a local, low-privileged user executes certain routing-related 'show' commands. These commands cause the rpd process to leak memory continuously, as evidenced by increasing allocations visible via the CLI command 'show task memory detail | match task_shard_mgmt_cookie'. Over time, this memory leak can consume all available memory, leading to a crash and automatic restart of the rpd process. While the vulnerability requires local access and low privileges, it does not require user interaction beyond executing the commands. The impact is limited to availability, with no direct confidentiality or integrity compromise. The affected Junos OS versions span multiple releases prior to various patch levels, including versions before 21.2R3-S9, 21.4R3-S11, 22.2R3-S7, 22.4R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2, and 24.4R1-S2/24.4R2. Similarly, Junos OS Evolved versions before 22.2R3-S7-EVO and subsequent patch releases are affected. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.5 (medium), reflecting the local attack vector, low complexity, low privileges required, no user interaction, and impact limited to availability. The vulnerability is significant for network infrastructure stability, as rpd is critical for routing operations in Juniper devices. Persistent crashes and restarts could disrupt network routing, causing outages or degraded performance.

Potential Impact

For European organizations, especially those relying on Juniper Networks infrastructure for critical routing and network services, this vulnerability poses a risk to network availability. The rpd process is central to routing protocol operations; its instability can lead to routing disruptions, network outages, or degraded service quality. This is particularly impactful for ISPs, data centers, financial institutions, and large enterprises with complex network topologies. The requirement for local access limits remote exploitation risk, but insider threats or compromised administrative accounts could trigger the memory leak. Additionally, automated scripts or monitoring tools that run routing-related 'show' commands could inadvertently exacerbate the issue if RIB sharding is enabled. Network downtime or routing instability can have cascading effects on business operations, regulatory compliance (e.g., GDPR mandates on service availability), and customer trust. Given the widespread use of Juniper devices in European telecom and enterprise networks, the vulnerability could affect a broad range of sectors.

Mitigation Recommendations

1. Immediate patching: Apply the latest Junos OS and Junos OS Evolved updates that address this vulnerability as listed in the affected versions. Prioritize devices running vulnerable versions with RIB sharding enabled. 2. Disable RIB sharding if not essential: Temporarily disable RIB sharding to prevent triggering the memory leak until patches are applied. 3. Restrict local access: Limit local user access to trusted administrators only, enforce strict access controls, and monitor for unauthorized local command execution. 4. Monitor memory usage: Regularly use the CLI command 'show task memory detail | match task_shard_mgmt_cookie' to detect abnormal memory growth in rpd. Set alerts for unusual increases. 5. Audit and control command usage: Review and restrict the use of routing-related 'show' commands that can trigger the leak, especially in automated scripts or monitoring tools. 6. Incident response readiness: Prepare to respond to potential rpd crashes by having network redundancy and failover mechanisms in place to minimize service disruption. 7. Vendor coordination: Engage with Juniper support for guidance and to receive timely updates on patches and workarounds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T18:23:44.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68712e3ba83201eaacaf5d1e

Added to database: 7/11/2025, 3:31:07 PM

Last enriched: 7/11/2025, 3:47:37 PM

Last updated: 7/11/2025, 7:35:58 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats