Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59962: CWE-824 Access of Uninitialized Pointer in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2025-59962cvecve-2025-59962cwe-824
Published: Thu Oct 09 2025 (10/09/2025, 15:45:19 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP sharding configured allows an attacker triggering indirect next-hop updates, along with timing outside the attacker's control, to cause rpd to crash and restart, leading to a Denial of Service (DoS). With BGP sharding enabled, triggering route resolution of an indirect next-hop (e.g., an IGP route change over which a BGP route gets resolved), may cause rpd to crash and restart. An attacker causing continuous IGP route churn, resulting in repeated route re-resolution, will increase the likelihood of triggering this issue, leading to a potentially extended DoS condition. This issue affects: Junos OS: * all versions before 21.4R3-S6,  * from 22.1 before 22.1R3-S6,  * from 22.2 before 22.2R3-S3,  * from 22.3 before 22.3R3-S3,  * from 22.4 before 22.4R3,  * from 23.2 before 23.2R2;  Junos OS Evolved:  * all versions before 22.3R3-S3-EVO,  * from 22.4 before 22.4R3-EVO,  * from 23.2 before 23.2R2-EVO. Versions before Junos OS 21.3R1 and Junos OS Evolved 21.3R1-EVO are unaffected by this issue.

AI-Powered Analysis

AILast updated: 10/09/2025, 16:09:26 UTC

Technical Analysis

CVE-2025-59962 is a medium-severity vulnerability classified under CWE-824 (Access of Uninitialized Pointer) found in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. The vulnerability specifically manifests when BGP sharding is enabled, a configuration used to improve BGP scalability by partitioning routing tables. The flaw arises when the rpd processes indirect next-hop updates triggered by changes in the Interior Gateway Protocol (IGP) routes that BGP routes depend upon. An attacker can induce indirect next-hop updates combined with timing conditions outside their control to cause the rpd process to access uninitialized memory pointers, leading to a crash and subsequent restart of the daemon. This results in a Denial of Service (DoS) condition affecting routing stability. The vulnerability can be exacerbated by continuous IGP route churn, which forces repeated route re-resolution and increases the likelihood of triggering the crash. Affected Junos OS versions include all releases before 21.4R3-S6, and various releases up to 23.2R2, with similar version ranges for Junos OS Evolved. Versions prior to 21.3R1 are not vulnerable. The CVSS v3.1 base score is 5.3, reflecting a network attack vector requiring high attack complexity but no privileges or user interaction. No public exploits or active exploitation have been reported to date. The vulnerability impacts the availability of routing services, potentially disrupting network operations in environments using Juniper routers with BGP sharding enabled.

Potential Impact

For European organizations, this vulnerability poses a risk of network instability and service disruption due to potential Denial of Service conditions on critical routing infrastructure. Organizations operating Juniper routers with Junos OS or Junos OS Evolved versions affected by this vulnerability and configured with BGP sharding are at risk of rpd crashes triggered by malicious or accidental IGP route churn. This can lead to intermittent or prolonged loss of routing capabilities, impacting business continuity, especially for ISPs, cloud providers, financial institutions, and enterprises relying on Juniper networking equipment for critical connectivity. The impact is primarily on availability, with no direct confidentiality or integrity compromise reported. However, routing outages can indirectly affect data flows and service delivery. Given the medium CVSS score and the complexity of exploitation, the threat is moderate but should not be underestimated in environments with high routing churn or targeted attacks aiming to disrupt network operations.

Mitigation Recommendations

1. Upgrade affected Junos OS and Junos OS Evolved devices to the fixed versions as soon as patches become available from Juniper Networks. 2. If immediate patching is not feasible, consider disabling BGP sharding temporarily or reconfiguring routing policies to minimize indirect next-hop updates and IGP route churn. 3. Monitor routing protocol daemon (rpd) stability and logs for signs of crashes or restarts, especially in environments with frequent IGP route changes. 4. Implement network segmentation and rate limiting to reduce the potential for an attacker to induce continuous IGP route churn. 5. Employ anomaly detection systems to identify unusual routing updates or patterns that could trigger the vulnerability. 6. Coordinate with Juniper support for guidance on interim mitigations and best practices tailored to your network environment. 7. Maintain an up-to-date inventory of Juniper devices and their software versions to prioritize patching efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-09-23T18:19:06.955Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7da5fba0e608b4fa05b98

Added to database: 10/9/2025, 3:53:03 PM

Last enriched: 10/9/2025, 4:09:26 PM

Last updated: 11/22/2025, 11:46:56 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats