CVE-2025-59960: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to a Denial of Service (DoS) on the downstream DHCP server. By default, the DHCP relay agent inserts its own Option 82 information when forwarding client requests, optionally replacing any Option 82 information provided by the client. When a specific DHCP DISCOVER is received in 'forward-only' mode with Option 82, the device should drop the message unless 'trust-option82' is configured. Instead, the DHCP relay forwards these packets to the DHCP server unmodified, which uses up addresses in the DHCP server's address pool, ultimately leading to address pool exhaustion. This issue affects Junos OS: * all versions before 21.2R3-S10, * from 21.4 before 21.4R3-S12, * all versions of 22.2, * from 22.4 before 22.4R3-S8, * from 23.2 before 23.2R2-S5, * from 23.4 before 23.4R2-S6, * from 24.2 before 24.2R2-S2, * from 24.4 before 24.4R2, * from 25.2 before 25.2R1-S1, 25.2R2. Junos OS Evolved: * all versions before 21.4R3-S12-EVO, * all versions of 22.2-EVO, * from 22.4 before 22.4R3-S8-EVO, * from 23.2 before 23.2R2-S5-EVO, * from 23.4 before 23.4R2-S6-EVO, * from 24.2 before 24.2R2-S2-EVO, * from 24.4 before 24.4R2-EVO, * from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.
AI Analysis
Technical Summary
CVE-2025-59960 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting the DHCP relay functionality in Juniper Networks Junos OS and Junos OS Evolved. The DHCP relay agent is responsible for forwarding DHCP client requests across subnets, inserting Option 82 information to identify the relay point. By default, the relay inserts its own Option 82, optionally replacing any client-provided Option 82. However, when operating in 'forward-only' mode, the relay should drop DHCP DISCOVER packets containing Option 82 unless the 'trust-option82' configuration is enabled. Due to improper validation, the relay forwards these packets unmodified to the DHCP server. This flaw allows a malicious DHCP client on one subnet to send crafted DHCP DISCOVER requests that consume IP addresses from other subnets' DHCP pools, leading to exhaustion of available addresses and causing a Denial of Service (DoS) for legitimate clients. The vulnerability affects a broad range of Junos OS versions before the patched releases listed, spanning from versions prior to 21.2R3-S10 up to versions before 25.2R1-S1 and 25.2R2, including Junos OS Evolved variants. The CVSS v3.1 score is 7.4, indicating high severity with an attack vector requiring adjacent network access, low complexity, no privileges, and no user interaction. The impact is limited to availability, with no direct confidentiality or integrity compromise. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk to network availability in environments relying on affected Juniper DHCP relay implementations.
Potential Impact
For European organizations, this vulnerability can lead to significant network disruption by causing DHCP address pool exhaustion, resulting in denial of service for clients requiring IP address assignment. This can impact critical infrastructure, enterprise networks, and service providers using Juniper routers and switches running affected Junos OS versions. The disruption could affect business continuity, especially in sectors reliant on stable network connectivity such as finance, healthcare, telecommunications, and government. The ability of an attacker to cause cross-subnet DHCP exhaustion means that even clients on isolated subnets can impact other network segments, increasing the attack surface. Given the widespread use of Juniper equipment in Europe, particularly in telecommunications and large enterprises, the potential for service outages and operational impact is considerable. Additionally, the vulnerability could be leveraged as part of a broader attack to degrade network services or as a diversion for other malicious activities.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately identify and inventory all Juniper devices running affected Junos OS and Junos OS Evolved versions. They should prioritize upgrading to the fixed versions as specified by Juniper Networks, ensuring to apply the latest patches that address CVE-2025-59960. Until patches are applied, network administrators should review and adjust DHCP relay configurations, specifically verifying the use of 'trust-option82' settings to ensure that DHCP DISCOVER packets with Option 82 are properly validated and dropped when necessary. Network segmentation and access controls should be enforced to limit DHCP client access to trusted subnets only, reducing the risk of malicious DHCP requests originating from unauthorized clients. Monitoring DHCP server logs and network traffic for unusual DHCP DISCOVER patterns or rapid address pool depletion can provide early detection of exploitation attempts. Implementing rate limiting on DHCP requests and employing DHCP snooping features where supported can further reduce risk. Coordination with Juniper support and following their security advisories is recommended for ongoing updates and best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2025-59960: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to a Denial of Service (DoS) on the downstream DHCP server. By default, the DHCP relay agent inserts its own Option 82 information when forwarding client requests, optionally replacing any Option 82 information provided by the client. When a specific DHCP DISCOVER is received in 'forward-only' mode with Option 82, the device should drop the message unless 'trust-option82' is configured. Instead, the DHCP relay forwards these packets to the DHCP server unmodified, which uses up addresses in the DHCP server's address pool, ultimately leading to address pool exhaustion. This issue affects Junos OS: * all versions before 21.2R3-S10, * from 21.4 before 21.4R3-S12, * all versions of 22.2, * from 22.4 before 22.4R3-S8, * from 23.2 before 23.2R2-S5, * from 23.4 before 23.4R2-S6, * from 24.2 before 24.2R2-S2, * from 24.4 before 24.4R2, * from 25.2 before 25.2R1-S1, 25.2R2. Junos OS Evolved: * all versions before 21.4R3-S12-EVO, * all versions of 22.2-EVO, * from 22.4 before 22.4R3-S8-EVO, * from 23.2 before 23.2R2-S5-EVO, * from 23.4 before 23.4R2-S6-EVO, * from 24.2 before 24.2R2-S2-EVO, * from 24.4 before 24.4R2-EVO, * from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.
AI-Powered Analysis
Technical Analysis
CVE-2025-59960 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting the DHCP relay functionality in Juniper Networks Junos OS and Junos OS Evolved. The DHCP relay agent is responsible for forwarding DHCP client requests across subnets, inserting Option 82 information to identify the relay point. By default, the relay inserts its own Option 82, optionally replacing any client-provided Option 82. However, when operating in 'forward-only' mode, the relay should drop DHCP DISCOVER packets containing Option 82 unless the 'trust-option82' configuration is enabled. Due to improper validation, the relay forwards these packets unmodified to the DHCP server. This flaw allows a malicious DHCP client on one subnet to send crafted DHCP DISCOVER requests that consume IP addresses from other subnets' DHCP pools, leading to exhaustion of available addresses and causing a Denial of Service (DoS) for legitimate clients. The vulnerability affects a broad range of Junos OS versions before the patched releases listed, spanning from versions prior to 21.2R3-S10 up to versions before 25.2R1-S1 and 25.2R2, including Junos OS Evolved variants. The CVSS v3.1 score is 7.4, indicating high severity with an attack vector requiring adjacent network access, low complexity, no privileges, and no user interaction. The impact is limited to availability, with no direct confidentiality or integrity compromise. No known exploits are reported in the wild yet, but the vulnerability poses a significant risk to network availability in environments relying on affected Juniper DHCP relay implementations.
Potential Impact
For European organizations, this vulnerability can lead to significant network disruption by causing DHCP address pool exhaustion, resulting in denial of service for clients requiring IP address assignment. This can impact critical infrastructure, enterprise networks, and service providers using Juniper routers and switches running affected Junos OS versions. The disruption could affect business continuity, especially in sectors reliant on stable network connectivity such as finance, healthcare, telecommunications, and government. The ability of an attacker to cause cross-subnet DHCP exhaustion means that even clients on isolated subnets can impact other network segments, increasing the attack surface. Given the widespread use of Juniper equipment in Europe, particularly in telecommunications and large enterprises, the potential for service outages and operational impact is considerable. Additionally, the vulnerability could be leveraged as part of a broader attack to degrade network services or as a diversion for other malicious activities.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately identify and inventory all Juniper devices running affected Junos OS and Junos OS Evolved versions. They should prioritize upgrading to the fixed versions as specified by Juniper Networks, ensuring to apply the latest patches that address CVE-2025-59960. Until patches are applied, network administrators should review and adjust DHCP relay configurations, specifically verifying the use of 'trust-option82' settings to ensure that DHCP DISCOVER packets with Option 82 are properly validated and dropped when necessary. Network segmentation and access controls should be enforced to limit DHCP client access to trusted subnets only, reducing the risk of malicious DHCP requests originating from unauthorized clients. Monitoring DHCP server logs and network traffic for unusual DHCP DISCOVER patterns or rapid address pool depletion can provide early detection of exploitation attempts. Implementing rate limiting on DHCP requests and employing DHCP snooping features where supported can further reduce risk. Coordination with Juniper support and following their security advisories is recommended for ongoing updates and best practices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.954Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69694e761ab3796b105000ea
Added to database: 1/15/2026, 8:30:46 PM
Last enriched: 1/15/2026, 8:46:45 PM
Last updated: 1/15/2026, 11:19:36 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22863: CWE-325: Missing Cryptographic Step in denoland deno
CriticalCVE-2026-1012
UnknownCVE-2026-22864: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in denoland deno
HighCVE-2026-1010: CWE-79 Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) in Altium Altium 365
HighCVE-2025-68671: CWE-294: Authentication Bypass by Capture-replay in treeverse lakeFS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.