CVE-2025-52986: CWE-401 Missing Release of Memory after Effective Lifetime in Juniper Networks Junos OS
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart. The leak can be monitored with the CLI command: show task memory detail | match task_shard_mgmt_cookie where the allocated memory in bytes can be seen to continuously increase with each exploitation. This issue affects: Junos OS: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S11, * 22.2 versions before 22.2R3-S7, * 22.4 versions before 22.4R3-S7, * 23.2 versions before 23.2R2-S4, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2, * 24.4 versions before 24.4R1-S2, 24.4R2; Junos OS Evolved: * all versions before 22.2R3-S7-EVO * 22.4-EVO versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO, * 24.4-EVO versions before 24.4R2-EVO.
AI Analysis
Technical Summary
CVE-2025-52986 is a medium-severity vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved, specifically within the routing protocol daemon (rpd). The vulnerability is classified as CWE-401, indicating a Missing Release of Memory after Effective Lifetime, commonly known as a memory leak. This flaw occurs when RIB (Routing Information Base) sharding is enabled and a local, low-privileged user executes certain routing-related 'show' commands. These commands cause the rpd process to leak memory continuously, as evidenced by increasing allocations visible via the CLI command 'show task memory detail | match task_shard_mgmt_cookie'. Over time, this memory leak can consume all available memory, leading to a crash and automatic restart of the rpd process. While the vulnerability requires local access and low privileges, it does not require user interaction beyond executing the commands. The impact is limited to availability, with no direct confidentiality or integrity compromise. The affected Junos OS versions span multiple releases prior to various patch levels, including versions before 21.2R3-S9, 21.4R3-S11, 22.2R3-S7, 22.4R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2, and 24.4R1-S2/24.4R2. Similarly, Junos OS Evolved versions before 22.2R3-S7-EVO and subsequent patch releases are affected. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.5 (medium), reflecting the local attack vector, low complexity, low privileges required, no user interaction, and impact limited to availability. The vulnerability is significant for network infrastructure stability, as rpd is critical for routing operations in Juniper devices. Persistent crashes and restarts could disrupt network routing, causing outages or degraded performance.
Potential Impact
For European organizations, especially those relying on Juniper Networks infrastructure for critical routing and network services, this vulnerability poses a risk to network availability. The rpd process is central to routing protocol operations; its instability can lead to routing disruptions, network outages, or degraded service quality. This is particularly impactful for ISPs, data centers, financial institutions, and large enterprises with complex network topologies. The requirement for local access limits remote exploitation risk, but insider threats or compromised administrative accounts could trigger the memory leak. Additionally, automated scripts or monitoring tools that run routing-related 'show' commands could inadvertently exacerbate the issue if RIB sharding is enabled. Network downtime or routing instability can have cascading effects on business operations, regulatory compliance (e.g., GDPR mandates on service availability), and customer trust. Given the widespread use of Juniper devices in European telecom and enterprise networks, the vulnerability could affect a broad range of sectors.
Mitigation Recommendations
1. Immediate patching: Apply the latest Junos OS and Junos OS Evolved updates that address this vulnerability as listed in the affected versions. Prioritize devices running vulnerable versions with RIB sharding enabled. 2. Disable RIB sharding if not essential: Temporarily disable RIB sharding to prevent triggering the memory leak until patches are applied. 3. Restrict local access: Limit local user access to trusted administrators only, enforce strict access controls, and monitor for unauthorized local command execution. 4. Monitor memory usage: Regularly use the CLI command 'show task memory detail | match task_shard_mgmt_cookie' to detect abnormal memory growth in rpd. Set alerts for unusual increases. 5. Audit and control command usage: Review and restrict the use of routing-related 'show' commands that can trigger the leak, especially in automated scripts or monitoring tools. 6. Incident response readiness: Prepare to respond to potential rpd crashes by having network redundancy and failover mechanisms in place to minimize service disruption. 7. Vendor coordination: Engage with Juniper support for guidance and to receive timely updates on patches and workarounds.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Switzerland
CVE-2025-52986: CWE-401 Missing Release of Memory after Effective Lifetime in Juniper Networks Junos OS
Description
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart. The leak can be monitored with the CLI command: show task memory detail | match task_shard_mgmt_cookie where the allocated memory in bytes can be seen to continuously increase with each exploitation. This issue affects: Junos OS: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S11, * 22.2 versions before 22.2R3-S7, * 22.4 versions before 22.4R3-S7, * 23.2 versions before 23.2R2-S4, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2, * 24.4 versions before 24.4R1-S2, 24.4R2; Junos OS Evolved: * all versions before 22.2R3-S7-EVO * 22.4-EVO versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO, * 24.4-EVO versions before 24.4R2-EVO.
AI-Powered Analysis
Technical Analysis
CVE-2025-52986 is a medium-severity vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved, specifically within the routing protocol daemon (rpd). The vulnerability is classified as CWE-401, indicating a Missing Release of Memory after Effective Lifetime, commonly known as a memory leak. This flaw occurs when RIB (Routing Information Base) sharding is enabled and a local, low-privileged user executes certain routing-related 'show' commands. These commands cause the rpd process to leak memory continuously, as evidenced by increasing allocations visible via the CLI command 'show task memory detail | match task_shard_mgmt_cookie'. Over time, this memory leak can consume all available memory, leading to a crash and automatic restart of the rpd process. While the vulnerability requires local access and low privileges, it does not require user interaction beyond executing the commands. The impact is limited to availability, with no direct confidentiality or integrity compromise. The affected Junos OS versions span multiple releases prior to various patch levels, including versions before 21.2R3-S9, 21.4R3-S11, 22.2R3-S7, 22.4R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2, and 24.4R1-S2/24.4R2. Similarly, Junos OS Evolved versions before 22.2R3-S7-EVO and subsequent patch releases are affected. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.5 (medium), reflecting the local attack vector, low complexity, low privileges required, no user interaction, and impact limited to availability. The vulnerability is significant for network infrastructure stability, as rpd is critical for routing operations in Juniper devices. Persistent crashes and restarts could disrupt network routing, causing outages or degraded performance.
Potential Impact
For European organizations, especially those relying on Juniper Networks infrastructure for critical routing and network services, this vulnerability poses a risk to network availability. The rpd process is central to routing protocol operations; its instability can lead to routing disruptions, network outages, or degraded service quality. This is particularly impactful for ISPs, data centers, financial institutions, and large enterprises with complex network topologies. The requirement for local access limits remote exploitation risk, but insider threats or compromised administrative accounts could trigger the memory leak. Additionally, automated scripts or monitoring tools that run routing-related 'show' commands could inadvertently exacerbate the issue if RIB sharding is enabled. Network downtime or routing instability can have cascading effects on business operations, regulatory compliance (e.g., GDPR mandates on service availability), and customer trust. Given the widespread use of Juniper devices in European telecom and enterprise networks, the vulnerability could affect a broad range of sectors.
Mitigation Recommendations
1. Immediate patching: Apply the latest Junos OS and Junos OS Evolved updates that address this vulnerability as listed in the affected versions. Prioritize devices running vulnerable versions with RIB sharding enabled. 2. Disable RIB sharding if not essential: Temporarily disable RIB sharding to prevent triggering the memory leak until patches are applied. 3. Restrict local access: Limit local user access to trusted administrators only, enforce strict access controls, and monitor for unauthorized local command execution. 4. Monitor memory usage: Regularly use the CLI command 'show task memory detail | match task_shard_mgmt_cookie' to detect abnormal memory growth in rpd. Set alerts for unusual increases. 5. Audit and control command usage: Review and restrict the use of routing-related 'show' commands that can trigger the leak, especially in automated scripts or monitoring tools. 6. Incident response readiness: Prepare to respond to potential rpd crashes by having network redundancy and failover mechanisms in place to minimize service disruption. 7. Vendor coordination: Engage with Juniper support for guidance and to receive timely updates on patches and workarounds.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2025-06-23T18:23:44.546Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68712e3ba83201eaacaf5d1e
Added to database: 7/11/2025, 3:31:07 PM
Last enriched: 7/11/2025, 3:47:37 PM
Last updated: 7/11/2025, 7:35:58 PM
Views: 4
Related Threats
CVE-2025-7460: Buffer Overflow in TOTOLINK T6
HighCVE-2025-53636: CWE-400: Uncontrolled Resource Consumption in OSC ondemand
MediumCVE-2025-7459: SQL Injection in code-projects Mobile Shop
MediumCVE-2025-7457: SQL Injection in Campcodes Online Movie Theater Seat Reservation System
MediumCVE-2025-52955: CWE-131 Incorrect Calculation of Buffer Size in Juniper Networks Junos OS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.