CVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS). When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. 'show route ... extensive' is not affected. This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.
AI Analysis
Technical Summary
CVE-2025-59959 is a medium-severity vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting the routing protocol daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises when a local, authenticated user with low privileges executes the command 'show route <(receive-protocol|advertising-protocol) bgp> detail' and the output includes routes with specific attributes that trigger an untrusted pointer dereference in the rpd process. This causes the rpd to crash and subsequently restart, resulting in a Denial-of-Service (DoS) condition that disrupts routing services temporarily. The vulnerability affects all versions of Junos OS before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions prior to their respective patch releases, as well as corresponding versions of Junos OS Evolved. The issue does not affect the 'show route ... extensive' command variant, indicating a specific parsing or handling flaw in the detailed route display logic. Exploitation requires local access with authentication but only low privileges, making it feasible for insiders or attackers who have gained limited access. The vulnerability does not impact confidentiality or integrity but affects availability by causing service interruptions. No public exploits have been reported, and Juniper has released patches in the specified versions to remediate the issue.
Potential Impact
For European organizations relying on Juniper Networks Junos OS or Junos OS Evolved in their network infrastructure, this vulnerability poses a risk of temporary Denial-of-Service affecting routing services. The rpd process crash and restart can lead to transient network outages, routing instability, or degraded network performance, impacting business-critical communications and services. Organizations with multi-tenant environments or those with strict uptime requirements may experience operational disruptions. Since exploitation requires local authenticated access with low privileges, the threat is higher for environments where internal threat actors or compromised user accounts exist. The lack of confidentiality or integrity impact limits data breach risks, but availability disruptions can affect service level agreements (SLAs) and incident response efforts. The vulnerability is particularly relevant for ISPs, data centers, financial institutions, and critical infrastructure operators in Europe that deploy Juniper routing equipment extensively.
Mitigation Recommendations
European organizations should prioritize patching affected Junos OS and Junos OS Evolved versions to the fixed releases: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S5 (or S6 for EVO) or later, 24.2R2-S2 or later, and 24.4R2 or later. Until patches are applied, restrict local access to network devices to trusted administrators only and enforce strict authentication and authorization controls to minimize the risk of low-privilege exploitation. Monitor and audit usage of the 'show route' commands, especially those involving BGP protocol details, to detect unusual or unauthorized command executions. Implement network segmentation and role-based access controls (RBAC) to limit the exposure of Juniper devices to potentially malicious insiders or compromised accounts. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. Engage with Juniper support for any additional recommended mitigations or workarounds if immediate patching is not feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
Description
An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS). When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. 'show route ... extensive' is not affected. This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.
AI-Powered Analysis
Technical Analysis
CVE-2025-59959 is a medium-severity vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting the routing protocol daemon (rpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises when a local, authenticated user with low privileges executes the command 'show route <(receive-protocol|advertising-protocol) bgp> detail' and the output includes routes with specific attributes that trigger an untrusted pointer dereference in the rpd process. This causes the rpd to crash and subsequently restart, resulting in a Denial-of-Service (DoS) condition that disrupts routing services temporarily. The vulnerability affects all versions of Junos OS before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions prior to their respective patch releases, as well as corresponding versions of Junos OS Evolved. The issue does not affect the 'show route ... extensive' command variant, indicating a specific parsing or handling flaw in the detailed route display logic. Exploitation requires local access with authentication but only low privileges, making it feasible for insiders or attackers who have gained limited access. The vulnerability does not impact confidentiality or integrity but affects availability by causing service interruptions. No public exploits have been reported, and Juniper has released patches in the specified versions to remediate the issue.
Potential Impact
For European organizations relying on Juniper Networks Junos OS or Junos OS Evolved in their network infrastructure, this vulnerability poses a risk of temporary Denial-of-Service affecting routing services. The rpd process crash and restart can lead to transient network outages, routing instability, or degraded network performance, impacting business-critical communications and services. Organizations with multi-tenant environments or those with strict uptime requirements may experience operational disruptions. Since exploitation requires local authenticated access with low privileges, the threat is higher for environments where internal threat actors or compromised user accounts exist. The lack of confidentiality or integrity impact limits data breach risks, but availability disruptions can affect service level agreements (SLAs) and incident response efforts. The vulnerability is particularly relevant for ISPs, data centers, financial institutions, and critical infrastructure operators in Europe that deploy Juniper routing equipment extensively.
Mitigation Recommendations
European organizations should prioritize patching affected Junos OS and Junos OS Evolved versions to the fixed releases: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S5 (or S6 for EVO) or later, 24.2R2-S2 or later, and 24.4R2 or later. Until patches are applied, restrict local access to network devices to trusted administrators only and enforce strict authentication and authorization controls to minimize the risk of low-privilege exploitation. Monitor and audit usage of the 'show route' commands, especially those involving BGP protocol details, to detect unusual or unauthorized command executions. Implement network segmentation and role-based access controls (RBAC) to limit the exposure of Juniper devices to potentially malicious insiders or compromised accounts. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. Engage with Juniper support for any additional recommended mitigations or workarounds if immediate patching is not feasible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.954Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69695d667c726673b645f26e
Added to database: 1/15/2026, 9:34:30 PM
Last enriched: 1/15/2026, 9:34:59 PM
Last updated: 2/7/2026, 1:47:05 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.