CVE-2025-59960: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
CVE-2025-59960 is a high-severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting the DHCP relay agent. The flaw allows a DHCP client in one subnet to exhaust DHCP address pools of other subnets by exploiting improper handling of DHCP Option 82 in 'forward-only' mode. This leads to denial of service (DoS) on downstream DHCP servers by depleting available IP addresses. The vulnerability affects multiple Junos OS versions prior to various fixed releases starting from 21. 2R3-S10 and corresponding Junos OS Evolved versions. Exploitation requires network access but no authentication or user interaction, with a CVSS score of 7. 4. No known exploits are currently reported in the wild. European organizations using vulnerable Juniper devices should prioritize patching and consider network segmentation and DHCP relay configuration hardening to mitigate risk.
AI Analysis
Technical Summary
CVE-2025-59960 is an improper check for unusual or exceptional conditions vulnerability (CWE-754) found in the DHCP relay agent (jdhcpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises because the DHCP relay agent incorrectly forwards DHCP DISCOVER messages containing Option 82 information in 'forward-only' mode without dropping them when it should, unless the 'trust-option82' configuration is enabled. Option 82 is used by DHCP relay agents to insert circuit identification and remote ID information, which helps DHCP servers assign IP addresses appropriately. Due to this improper handling, a malicious DHCP client located in one subnet can send crafted DHCP DISCOVER packets that cause the DHCP server to allocate IP addresses from other subnets' pools. This leads to exhaustion of the DHCP address pool on the downstream DHCP server, resulting in a denial of service condition where legitimate clients cannot obtain IP addresses. The vulnerability affects a wide range of Junos OS versions, including all versions before 21.2R3-S10, certain versions from 21.4 through 25.2, and their corresponding Junos OS Evolved versions. The CVSS 3.1 base score is 7.4, reflecting a high severity due to the ability to cause availability impact without requiring authentication or user interaction, though the attack requires network access to the DHCP relay. No public exploits have been reported yet, but the vulnerability poses a significant risk to network availability in environments using vulnerable Juniper devices as DHCP relay agents.
Potential Impact
For European organizations, this vulnerability can disrupt critical network services by causing DHCP address pool exhaustion, leading to denial of service for end users and devices relying on DHCP for IP address assignment. This can affect enterprise networks, data centers, and service providers using Juniper routers and switches running vulnerable Junos OS versions. The impact is particularly severe in large-scale or segmented networks where DHCP relay agents manage multiple subnets, as an attacker in one subnet can impact others. This can cause operational downtime, loss of productivity, and potential cascading failures in dependent services. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure, which rely heavily on Juniper networking equipment, may face increased risk. Additionally, the attack does not require authentication, making it easier for internal or compromised attackers to exploit. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.
Mitigation Recommendations
European organizations should immediately assess their Juniper device inventory to identify affected Junos OS and Junos OS Evolved versions. Applying the vendor-provided patches and updates to fixed versions (e.g., 21.2R3-S10 or later) is the most effective mitigation. Until patches are applied, network administrators should consider disabling DHCP relay agents where not necessary or restricting DHCP relay functionality to trusted network segments. Configuring the DHCP relay agent to enable 'trust-option82' only when appropriate and ensuring strict validation of DHCP packets can reduce risk. Implementing network segmentation and access control lists (ACLs) to limit DHCP traffic from untrusted subnets can prevent malicious clients from exploiting this vulnerability. Monitoring DHCP server logs for unusual address allocation patterns and setting alerts for rapid address pool depletion can provide early detection. Additionally, organizations should review their incident response plans to handle potential DHCP service disruptions. Coordination with Juniper support for guidance and updates is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Switzerland
CVE-2025-59960: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
Description
CVE-2025-59960 is a high-severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting the DHCP relay agent. The flaw allows a DHCP client in one subnet to exhaust DHCP address pools of other subnets by exploiting improper handling of DHCP Option 82 in 'forward-only' mode. This leads to denial of service (DoS) on downstream DHCP servers by depleting available IP addresses. The vulnerability affects multiple Junos OS versions prior to various fixed releases starting from 21. 2R3-S10 and corresponding Junos OS Evolved versions. Exploitation requires network access but no authentication or user interaction, with a CVSS score of 7. 4. No known exploits are currently reported in the wild. European organizations using vulnerable Juniper devices should prioritize patching and consider network segmentation and DHCP relay configuration hardening to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-59960 is an improper check for unusual or exceptional conditions vulnerability (CWE-754) found in the DHCP relay agent (jdhcpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises because the DHCP relay agent incorrectly forwards DHCP DISCOVER messages containing Option 82 information in 'forward-only' mode without dropping them when it should, unless the 'trust-option82' configuration is enabled. Option 82 is used by DHCP relay agents to insert circuit identification and remote ID information, which helps DHCP servers assign IP addresses appropriately. Due to this improper handling, a malicious DHCP client located in one subnet can send crafted DHCP DISCOVER packets that cause the DHCP server to allocate IP addresses from other subnets' pools. This leads to exhaustion of the DHCP address pool on the downstream DHCP server, resulting in a denial of service condition where legitimate clients cannot obtain IP addresses. The vulnerability affects a wide range of Junos OS versions, including all versions before 21.2R3-S10, certain versions from 21.4 through 25.2, and their corresponding Junos OS Evolved versions. The CVSS 3.1 base score is 7.4, reflecting a high severity due to the ability to cause availability impact without requiring authentication or user interaction, though the attack requires network access to the DHCP relay. No public exploits have been reported yet, but the vulnerability poses a significant risk to network availability in environments using vulnerable Juniper devices as DHCP relay agents.
Potential Impact
For European organizations, this vulnerability can disrupt critical network services by causing DHCP address pool exhaustion, leading to denial of service for end users and devices relying on DHCP for IP address assignment. This can affect enterprise networks, data centers, and service providers using Juniper routers and switches running vulnerable Junos OS versions. The impact is particularly severe in large-scale or segmented networks where DHCP relay agents manage multiple subnets, as an attacker in one subnet can impact others. This can cause operational downtime, loss of productivity, and potential cascading failures in dependent services. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure, which rely heavily on Juniper networking equipment, may face increased risk. Additionally, the attack does not require authentication, making it easier for internal or compromised attackers to exploit. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.
Mitigation Recommendations
European organizations should immediately assess their Juniper device inventory to identify affected Junos OS and Junos OS Evolved versions. Applying the vendor-provided patches and updates to fixed versions (e.g., 21.2R3-S10 or later) is the most effective mitigation. Until patches are applied, network administrators should consider disabling DHCP relay agents where not necessary or restricting DHCP relay functionality to trusted network segments. Configuring the DHCP relay agent to enable 'trust-option82' only when appropriate and ensuring strict validation of DHCP packets can reduce risk. Implementing network segmentation and access control lists (ACLs) to limit DHCP traffic from untrusted subnets can prevent malicious clients from exploiting this vulnerability. Monitoring DHCP server logs for unusual address allocation patterns and setting alerts for rapid address pool depletion can provide early detection. Additionally, organizations should review their incident response plans to handle potential DHCP service disruptions. Coordination with Juniper support for guidance and updates is recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.954Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69694e761ab3796b105000ea
Added to database: 1/15/2026, 8:30:46 PM
Last enriched: 1/22/2026, 9:26:04 PM
Last updated: 2/6/2026, 8:51:24 PM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2066: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2026-25634: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighCVE-2026-25632: CWE-502: Deserialization of Untrusted Data in WaterFutures EPyT-Flow
CriticalCVE-2026-25731: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in kovidgoyal calibre
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.