CVE-2025-59958: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved
CVE-2025-59958 is a medium severity vulnerability in Juniper Networks Junos OS Evolved on PTX Series routers. It arises from improper handling of firewall filters configured with 'reject' actions on output filters applied to WAN or revenue interfaces. Packets matching these reject terms are incorrectly forwarded to the Routing Engine (RE), consuming its limited resources and potentially leaking confidential information in responses. This vulnerability can be exploited remotely without authentication or user interaction, impacting confidentiality and availability. It affects all Junos OS Evolved versions before 22. 4R3-EVO and 23. 2 versions before 23. 2R2-EVO. No known exploits are currently in the wild. European organizations using affected PTX Series routers on WAN interfaces should prioritize patching to prevent resource exhaustion and data leakage risks.
AI Analysis
Technical Summary
CVE-2025-59958 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting the Packet Forwarding Engine (PFE) in Juniper Networks Junos OS Evolved running on PTX Series routers. The flaw occurs when an output firewall filter is configured with one or more terms where the action is set to 'reject'. Instead of properly dropping these packets, the PFE erroneously forwards them to the Routing Engine (RE) for further processing. The RE has limited resources, and processing these unexpected packets can lead to resource exhaustion, impacting router availability. Additionally, the RE’s responses to the source of this traffic may inadvertently disclose confidential information about the device, thus impacting confidentiality. This issue specifically affects output filters applied to WAN or revenue interfaces, excluding management or loopback interfaces and input filters. The vulnerability is exploitable remotely by unauthenticated attackers without requiring user interaction, increasing its risk profile. It affects all Junos OS Evolved versions prior to 22.4R3-EVO and 23.2 versions prior to 23.2R2-EVO on PTX Series hardware. No public exploits or active exploitation have been reported yet. The CVSS v3.1 base score is 6.5, reflecting medium severity due to network attack vector, no privileges required, no user interaction, limited confidentiality impact, and availability impact through resource exhaustion.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure relying on Juniper PTX Series routers running affected Junos OS Evolved versions. The improper forwarding of rejected packets to the Routing Engine can lead to denial of service conditions by exhausting critical RE resources, potentially disrupting network availability and causing outages. Confidential information leakage through RE responses could expose sensitive device details to attackers, increasing the risk of further targeted attacks. Organizations with critical WAN or revenue interfaces using these routers are particularly vulnerable. Disruptions in core routing infrastructure can impact service providers, large enterprises, and government networks, leading to operational downtime and potential data breaches. Given the unauthenticated, remote exploitability, attackers can launch attacks from the internet without prior access, increasing the threat surface. The absence of known exploits in the wild provides a window for proactive mitigation, but the medium severity score indicates that exploitation could have meaningful operational impacts.
Mitigation Recommendations
European organizations should immediately assess their Juniper PTX Series routers to identify if they run affected Junos OS Evolved versions prior to 22.4R3-EVO or 23.2R2-EVO. Applying vendor-supplied patches or upgrading to fixed versions is the most effective mitigation. Until patches are applied, organizations should audit firewall filter configurations, specifically output filters with 'reject' actions on WAN or revenue interfaces, and consider temporarily disabling or modifying these filters to avoid triggering the vulnerability. Network segmentation and strict ingress filtering can help limit exposure to untrusted traffic that could exploit this flaw. Monitoring router logs and network traffic for unusual RE processing or unexpected responses may help detect exploitation attempts. Additionally, implementing rate limiting on traffic matching reject terms could reduce the risk of resource exhaustion. Coordination with Juniper support for guidance and updates is recommended. Finally, ensure robust incident response plans are in place to quickly address any signs of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-59958: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved
Description
CVE-2025-59958 is a medium severity vulnerability in Juniper Networks Junos OS Evolved on PTX Series routers. It arises from improper handling of firewall filters configured with 'reject' actions on output filters applied to WAN or revenue interfaces. Packets matching these reject terms are incorrectly forwarded to the Routing Engine (RE), consuming its limited resources and potentially leaking confidential information in responses. This vulnerability can be exploited remotely without authentication or user interaction, impacting confidentiality and availability. It affects all Junos OS Evolved versions before 22. 4R3-EVO and 23. 2 versions before 23. 2R2-EVO. No known exploits are currently in the wild. European organizations using affected PTX Series routers on WAN interfaces should prioritize patching to prevent resource exhaustion and data leakage risks.
AI-Powered Analysis
Technical Analysis
CVE-2025-59958 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting the Packet Forwarding Engine (PFE) in Juniper Networks Junos OS Evolved running on PTX Series routers. The flaw occurs when an output firewall filter is configured with one or more terms where the action is set to 'reject'. Instead of properly dropping these packets, the PFE erroneously forwards them to the Routing Engine (RE) for further processing. The RE has limited resources, and processing these unexpected packets can lead to resource exhaustion, impacting router availability. Additionally, the RE’s responses to the source of this traffic may inadvertently disclose confidential information about the device, thus impacting confidentiality. This issue specifically affects output filters applied to WAN or revenue interfaces, excluding management or loopback interfaces and input filters. The vulnerability is exploitable remotely by unauthenticated attackers without requiring user interaction, increasing its risk profile. It affects all Junos OS Evolved versions prior to 22.4R3-EVO and 23.2 versions prior to 23.2R2-EVO on PTX Series hardware. No public exploits or active exploitation have been reported yet. The CVSS v3.1 base score is 6.5, reflecting medium severity due to network attack vector, no privileges required, no user interaction, limited confidentiality impact, and availability impact through resource exhaustion.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure relying on Juniper PTX Series routers running affected Junos OS Evolved versions. The improper forwarding of rejected packets to the Routing Engine can lead to denial of service conditions by exhausting critical RE resources, potentially disrupting network availability and causing outages. Confidential information leakage through RE responses could expose sensitive device details to attackers, increasing the risk of further targeted attacks. Organizations with critical WAN or revenue interfaces using these routers are particularly vulnerable. Disruptions in core routing infrastructure can impact service providers, large enterprises, and government networks, leading to operational downtime and potential data breaches. Given the unauthenticated, remote exploitability, attackers can launch attacks from the internet without prior access, increasing the threat surface. The absence of known exploits in the wild provides a window for proactive mitigation, but the medium severity score indicates that exploitation could have meaningful operational impacts.
Mitigation Recommendations
European organizations should immediately assess their Juniper PTX Series routers to identify if they run affected Junos OS Evolved versions prior to 22.4R3-EVO or 23.2R2-EVO. Applying vendor-supplied patches or upgrading to fixed versions is the most effective mitigation. Until patches are applied, organizations should audit firewall filter configurations, specifically output filters with 'reject' actions on WAN or revenue interfaces, and consider temporarily disabling or modifying these filters to avoid triggering the vulnerability. Network segmentation and strict ingress filtering can help limit exposure to untrusted traffic that could exploit this flaw. Monitoring router logs and network traffic for unusual RE processing or unexpected responses may help detect exploitation attempts. Additionally, implementing rate limiting on traffic matching reject terms could reduce the risk of resource exhaustion. Coordination with Juniper support for guidance and updates is recommended. Finally, ensure robust incident response plans are in place to quickly address any signs of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.954Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e7da5fba0e608b4fa05b95
Added to database: 10/9/2025, 3:53:03 PM
Last enriched: 10/9/2025, 4:09:41 PM
Last updated: 10/9/2025, 6:28:08 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11551: SQL Injection in code-projects Student Result Manager
MediumCVE-2025-11550: NULL Pointer Dereference in Tenda W12
HighCVE-2025-11573: CWE-1286: Improper Validation of Syntactic Correctness of Input in Amazon Amazon.IonDotnet
HighCVE-2025-60267: n/a
HighCVE-2025-11371: Vulnerability in Gladinet CentreStack and TrioFox
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.