Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60011: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2025-60011cvecve-2025-60011cwe-754
Published: Thu Jan 15 2026 (01/15/2026, 20:16:47 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

CVE-2025-60011 is a medium severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting the routing protocol daemon (rpd). An unauthenticated, network-based attacker can send a crafted optional, transitive BGP attribute that is improperly checked and modified by the affected device before propagation. This causes peers to detect malformed attributes and likely terminate BGP sessions, resulting in routing instability and availability impact. The vulnerability affects multiple versions of Junos OS and Junos OS Evolved prior to specific patched releases. Exploitation does not require authentication or user interaction but can cause significant network disruption. No known exploits are currently reported in the wild. European organizations relying on Juniper routing infrastructure could experience network outages and degraded service availability. Mitigation requires timely patching to fixed Junos OS versions. Countries with high Juniper market penetration and critical network infrastructure are most at risk.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:33:29 UTC

Technical Analysis

CVE-2025-60011 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) found in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. The flaw arises when the affected device receives a specific optional, transitive BGP attribute over an established BGP session. Instead of correctly validating and propagating this attribute, the device erroneously modifies it before forwarding to its BGP peers. These peers then detect the attribute as malformed and typically respond by terminating the BGP session with the affected device. This termination leads to routing churn and an availability impact on downstream devices relying on these BGP sessions for routing information. The vulnerability can be exploited remotely by an unauthenticated attacker who can send crafted BGP updates, requiring no prior access or user interaction. The affected Junos OS versions include all releases before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions, and corresponding Junos OS Evolved versions before their respective patch releases. The CVSS v3.1 base score is 5.8 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and a scope change due to impact on downstream devices. Although no exploits are known in the wild yet, the vulnerability poses a risk of network instability and denial of service through BGP session disruption. Juniper has published patches in the indicated versions to address this issue.

Potential Impact

For European organizations, this vulnerability can lead to significant network availability issues, especially for those relying on Juniper routing devices for BGP peering and internet or inter-network connectivity. The forced termination of BGP sessions can cause routing instability, increased latency, packet loss, and potential outages of critical services dependent on stable network routes. This can affect ISPs, data centers, cloud providers, financial institutions, and enterprises with complex network topologies. The disruption of routing information propagation can also impact redundancy and failover mechanisms, increasing the risk of prolonged downtime. Given the unauthenticated nature of the exploit, attackers from outside the network perimeter can trigger these effects, raising concerns for border routers and peering points. The impact extends beyond a single device to downstream devices and networks relying on the affected BGP sessions, amplifying the scope of disruption. This can hinder business continuity, regulatory compliance (e.g., GDPR mandates on service availability), and damage organizational reputation.

Mitigation Recommendations

Organizations should prioritize upgrading Juniper Networks Junos OS and Junos OS Evolved to the fixed versions listed: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S6 or later, 24.2R2-S2 or later, and 24.4R2 or later, including their EVO counterparts. Network administrators should audit their routing infrastructure to identify affected devices and schedule maintenance windows for patch deployment. In parallel, implement strict BGP session filtering and validation controls to limit acceptance of unexpected or malformed BGP attributes from external peers. Employ BGP monitoring tools to detect abnormal session resets or routing churn indicative of exploitation attempts. Consider deploying route validation mechanisms such as RPKI to enhance BGP security posture. Network segmentation and limiting BGP session exposure to trusted peers can reduce attack surface. Maintain up-to-date backups of router configurations and have incident response plans ready for rapid remediation. Engage with Juniper support for guidance and monitor security advisories for any emerging exploit reports or additional mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2025-09-23T18:19:06.961Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e761ab3796b105000fa

Added to database: 1/15/2026, 8:30:46 PM

Last enriched: 1/22/2026, 9:33:29 PM

Last updated: 2/7/2026, 11:21:44 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats