Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59960: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS

0
High
VulnerabilityCVE-2025-59960cvecve-2025-59960cwe-754
Published: Thu Jan 15 2026 (01/15/2026, 20:14:00 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

CVE-2025-59960 is a high-severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting the DHCP relay agent. The flaw allows a DHCP client in one subnet to exhaust DHCP address pools of other subnets by exploiting improper handling of DHCP Option 82 in 'forward-only' mode. This leads to denial of service (DoS) on downstream DHCP servers by depleting available IP addresses. The vulnerability affects multiple Junos OS versions prior to various fixed releases starting from 21. 2R3-S10 and corresponding Junos OS Evolved versions. Exploitation requires network access but no authentication or user interaction, with a CVSS score of 7. 4. No known exploits are currently reported in the wild. European organizations using vulnerable Juniper devices should prioritize patching and consider network segmentation and DHCP relay configuration hardening to mitigate risk.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:26:04 UTC

Technical Analysis

CVE-2025-59960 is an improper check for unusual or exceptional conditions vulnerability (CWE-754) found in the DHCP relay agent (jdhcpd) component of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability arises because the DHCP relay agent incorrectly forwards DHCP DISCOVER messages containing Option 82 information in 'forward-only' mode without dropping them when it should, unless the 'trust-option82' configuration is enabled. Option 82 is used by DHCP relay agents to insert circuit identification and remote ID information, which helps DHCP servers assign IP addresses appropriately. Due to this improper handling, a malicious DHCP client located in one subnet can send crafted DHCP DISCOVER packets that cause the DHCP server to allocate IP addresses from other subnets' pools. This leads to exhaustion of the DHCP address pool on the downstream DHCP server, resulting in a denial of service condition where legitimate clients cannot obtain IP addresses. The vulnerability affects a wide range of Junos OS versions, including all versions before 21.2R3-S10, certain versions from 21.4 through 25.2, and their corresponding Junos OS Evolved versions. The CVSS 3.1 base score is 7.4, reflecting a high severity due to the ability to cause availability impact without requiring authentication or user interaction, though the attack requires network access to the DHCP relay. No public exploits have been reported yet, but the vulnerability poses a significant risk to network availability in environments using vulnerable Juniper devices as DHCP relay agents.

Potential Impact

For European organizations, this vulnerability can disrupt critical network services by causing DHCP address pool exhaustion, leading to denial of service for end users and devices relying on DHCP for IP address assignment. This can affect enterprise networks, data centers, and service providers using Juniper routers and switches running vulnerable Junos OS versions. The impact is particularly severe in large-scale or segmented networks where DHCP relay agents manage multiple subnets, as an attacker in one subnet can impact others. This can cause operational downtime, loss of productivity, and potential cascading failures in dependent services. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure, which rely heavily on Juniper networking equipment, may face increased risk. Additionally, the attack does not require authentication, making it easier for internal or compromised attackers to exploit. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.

Mitigation Recommendations

European organizations should immediately assess their Juniper device inventory to identify affected Junos OS and Junos OS Evolved versions. Applying the vendor-provided patches and updates to fixed versions (e.g., 21.2R3-S10 or later) is the most effective mitigation. Until patches are applied, network administrators should consider disabling DHCP relay agents where not necessary or restricting DHCP relay functionality to trusted network segments. Configuring the DHCP relay agent to enable 'trust-option82' only when appropriate and ensuring strict validation of DHCP packets can reduce risk. Implementing network segmentation and access control lists (ACLs) to limit DHCP traffic from untrusted subnets can prevent malicious clients from exploiting this vulnerability. Monitoring DHCP server logs for unusual address allocation patterns and setting alerts for rapid address pool depletion can provide early detection. Additionally, organizations should review their incident response plans to handle potential DHCP service disruptions. Coordination with Juniper support for guidance and updates is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2025-09-23T18:19:06.954Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e761ab3796b105000ea

Added to database: 1/15/2026, 8:30:46 PM

Last enriched: 1/22/2026, 9:26:04 PM

Last updated: 2/6/2026, 8:51:24 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats