CVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
CVE-2025-59959 is an Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. A local, authenticated attacker with low privileges can trigger a Denial-of-Service (DoS) by executing the command 'show route <(receive-protocol|advertising-protocol) bgp> detail' when certain route attributes are present, causing the rpd process to crash and restart. This vulnerability affects multiple versions of Junos OS and Junos OS Evolved prior to specific patched releases. The vulnerability does not impact the 'show route ... extensive' command. The CVSS score is 5. 5 (medium severity), reflecting a local attack vector with low complexity and no confidentiality or integrity impact but causing availability disruption. No known exploits are currently reported in the wild. European organizations using Juniper routing infrastructure with affected Junos versions are at risk of service disruption if exploited.
AI Analysis
Technical Summary
CVE-2025-59959 is a medium-severity vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting the routing protocol daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises when a local, authenticated user with low privileges executes the command 'show route <(receive-protocol|advertising-protocol) bgp> detail' and the output includes routes with specific attributes that trigger an untrusted pointer dereference in the rpd process. This causes the rpd to crash and subsequently restart, resulting in a Denial-of-Service (DoS) condition that disrupts routing services temporarily. The vulnerability affects all versions of Junos OS before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions prior to their respective patch releases, as well as corresponding versions of Junos OS Evolved. The issue does not affect the 'show route ... extensive' command variant, indicating a specific parsing or handling flaw in the detailed route display logic. Exploitation requires local access with authentication but only low privileges, making it feasible for insiders or attackers who have gained limited access. The vulnerability does not impact confidentiality or integrity but affects availability by causing service interruptions. No public exploits have been reported, and Juniper has released patches in the specified versions to remediate the issue.
Potential Impact
For European organizations relying on Juniper Networks Junos OS or Junos OS Evolved in their network infrastructure, this vulnerability poses a risk of temporary Denial-of-Service affecting routing services. The rpd process crash and restart can lead to transient network outages, routing instability, or degraded network performance, impacting business-critical communications and services. Organizations with multi-tenant environments or those with strict uptime requirements may experience operational disruptions. Since exploitation requires local authenticated access with low privileges, the threat is higher for environments where internal threat actors or compromised user accounts exist. The lack of confidentiality or integrity impact limits data breach risks, but availability disruptions can affect service level agreements (SLAs) and incident response efforts. The vulnerability is particularly relevant for ISPs, data centers, financial institutions, and critical infrastructure operators in Europe that deploy Juniper routing equipment extensively.
Mitigation Recommendations
European organizations should prioritize patching affected Junos OS and Junos OS Evolved versions to the fixed releases: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S5 (or S6 for EVO) or later, 24.2R2-S2 or later, and 24.4R2 or later. Until patches are applied, restrict local access to network devices to trusted administrators only and enforce strict authentication and authorization controls to minimize the risk of low-privilege exploitation. Monitor and audit usage of the 'show route' commands, especially those involving BGP protocol details, to detect unusual or unauthorized command executions. Implement network segmentation and role-based access controls (RBAC) to limit the exposure of Juniper devices to potentially malicious insiders or compromised accounts. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. Engage with Juniper support for any additional recommended mitigations or workarounds if immediate patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
Description
CVE-2025-59959 is an Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. A local, authenticated attacker with low privileges can trigger a Denial-of-Service (DoS) by executing the command 'show route <(receive-protocol|advertising-protocol) bgp> detail' when certain route attributes are present, causing the rpd process to crash and restart. This vulnerability affects multiple versions of Junos OS and Junos OS Evolved prior to specific patched releases. The vulnerability does not impact the 'show route ... extensive' command. The CVSS score is 5. 5 (medium severity), reflecting a local attack vector with low complexity and no confidentiality or integrity impact but causing availability disruption. No known exploits are currently reported in the wild. European organizations using Juniper routing infrastructure with affected Junos versions are at risk of service disruption if exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-59959 is a medium-severity vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting the routing protocol daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises when a local, authenticated user with low privileges executes the command 'show route <(receive-protocol|advertising-protocol) bgp> detail' and the output includes routes with specific attributes that trigger an untrusted pointer dereference in the rpd process. This causes the rpd to crash and subsequently restart, resulting in a Denial-of-Service (DoS) condition that disrupts routing services temporarily. The vulnerability affects all versions of Junos OS before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions prior to their respective patch releases, as well as corresponding versions of Junos OS Evolved. The issue does not affect the 'show route ... extensive' command variant, indicating a specific parsing or handling flaw in the detailed route display logic. Exploitation requires local access with authentication but only low privileges, making it feasible for insiders or attackers who have gained limited access. The vulnerability does not impact confidentiality or integrity but affects availability by causing service interruptions. No public exploits have been reported, and Juniper has released patches in the specified versions to remediate the issue.
Potential Impact
For European organizations relying on Juniper Networks Junos OS or Junos OS Evolved in their network infrastructure, this vulnerability poses a risk of temporary Denial-of-Service affecting routing services. The rpd process crash and restart can lead to transient network outages, routing instability, or degraded network performance, impacting business-critical communications and services. Organizations with multi-tenant environments or those with strict uptime requirements may experience operational disruptions. Since exploitation requires local authenticated access with low privileges, the threat is higher for environments where internal threat actors or compromised user accounts exist. The lack of confidentiality or integrity impact limits data breach risks, but availability disruptions can affect service level agreements (SLAs) and incident response efforts. The vulnerability is particularly relevant for ISPs, data centers, financial institutions, and critical infrastructure operators in Europe that deploy Juniper routing equipment extensively.
Mitigation Recommendations
European organizations should prioritize patching affected Junos OS and Junos OS Evolved versions to the fixed releases: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S5 (or S6 for EVO) or later, 24.2R2-S2 or later, and 24.4R2 or later. Until patches are applied, restrict local access to network devices to trusted administrators only and enforce strict authentication and authorization controls to minimize the risk of low-privilege exploitation. Monitor and audit usage of the 'show route' commands, especially those involving BGP protocol details, to detect unusual or unauthorized command executions. Implement network segmentation and role-based access controls (RBAC) to limit the exposure of Juniper devices to potentially malicious insiders or compromised accounts. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. Engage with Juniper support for any additional recommended mitigations or workarounds if immediate patching is not feasible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.954Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69695d667c726673b645f26e
Added to database: 1/15/2026, 9:34:30 PM
Last enriched: 1/15/2026, 9:34:59 PM
Last updated: 1/15/2026, 11:42:10 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1011: CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) in Altium Altium 365
HighCVE-2026-22863: CWE-325: Missing Cryptographic Step in denoland deno
CriticalCVE-2026-1012
LowCVE-2026-22864: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in denoland deno
HighCVE-2026-1010: CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) in Altium Altium 365
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.