CVE-2025-60011: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
CVE-2025-60011 is a medium severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting the routing protocol daemon (rpd). An unauthenticated, network-based attacker can send a crafted optional, transitive BGP attribute that is improperly checked and modified by the affected device before propagation. This causes peers to detect malformed attributes and likely terminate BGP sessions, resulting in routing instability and availability impact. The vulnerability affects multiple versions of Junos OS and Junos OS Evolved prior to specific patched releases. Exploitation does not require authentication or user interaction but can cause significant network disruption. No known exploits are currently reported in the wild. European organizations relying on Juniper routing infrastructure could experience network outages and degraded service availability. Mitigation requires timely patching to fixed Junos OS versions. Countries with high Juniper market penetration and critical network infrastructure are most at risk.
AI Analysis
Technical Summary
CVE-2025-60011 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) found in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. The flaw arises when the affected device receives a specific optional, transitive BGP attribute over an established BGP session. Instead of correctly validating and propagating this attribute, the device erroneously modifies it before forwarding to its BGP peers. These peers then detect the attribute as malformed and typically respond by terminating the BGP session with the affected device. This termination leads to routing churn and an availability impact on downstream devices relying on these BGP sessions for routing information. The vulnerability can be exploited remotely by an unauthenticated attacker who can send crafted BGP updates, requiring no prior access or user interaction. The affected Junos OS versions include all releases before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions, and corresponding Junos OS Evolved versions before their respective patch releases. The CVSS v3.1 base score is 5.8 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and a scope change due to impact on downstream devices. Although no exploits are known in the wild yet, the vulnerability poses a risk of network instability and denial of service through BGP session disruption. Juniper has published patches in the indicated versions to address this issue.
Potential Impact
For European organizations, this vulnerability can lead to significant network availability issues, especially for those relying on Juniper routing devices for BGP peering and internet or inter-network connectivity. The forced termination of BGP sessions can cause routing instability, increased latency, packet loss, and potential outages of critical services dependent on stable network routes. This can affect ISPs, data centers, cloud providers, financial institutions, and enterprises with complex network topologies. The disruption of routing information propagation can also impact redundancy and failover mechanisms, increasing the risk of prolonged downtime. Given the unauthenticated nature of the exploit, attackers from outside the network perimeter can trigger these effects, raising concerns for border routers and peering points. The impact extends beyond a single device to downstream devices and networks relying on the affected BGP sessions, amplifying the scope of disruption. This can hinder business continuity, regulatory compliance (e.g., GDPR mandates on service availability), and damage organizational reputation.
Mitigation Recommendations
Organizations should prioritize upgrading Juniper Networks Junos OS and Junos OS Evolved to the fixed versions listed: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S6 or later, 24.2R2-S2 or later, and 24.4R2 or later, including their EVO counterparts. Network administrators should audit their routing infrastructure to identify affected devices and schedule maintenance windows for patch deployment. In parallel, implement strict BGP session filtering and validation controls to limit acceptance of unexpected or malformed BGP attributes from external peers. Employ BGP monitoring tools to detect abnormal session resets or routing churn indicative of exploitation attempts. Consider deploying route validation mechanisms such as RPKI to enhance BGP security posture. Network segmentation and limiting BGP session exposure to trusted peers can reduce attack surface. Maintain up-to-date backups of router configurations and have incident response plans ready for rapid remediation. Engage with Juniper support for guidance and monitor security advisories for any emerging exploit reports or additional mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Switzerland
CVE-2025-60011: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
Description
CVE-2025-60011 is a medium severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting the routing protocol daemon (rpd). An unauthenticated, network-based attacker can send a crafted optional, transitive BGP attribute that is improperly checked and modified by the affected device before propagation. This causes peers to detect malformed attributes and likely terminate BGP sessions, resulting in routing instability and availability impact. The vulnerability affects multiple versions of Junos OS and Junos OS Evolved prior to specific patched releases. Exploitation does not require authentication or user interaction but can cause significant network disruption. No known exploits are currently reported in the wild. European organizations relying on Juniper routing infrastructure could experience network outages and degraded service availability. Mitigation requires timely patching to fixed Junos OS versions. Countries with high Juniper market penetration and critical network infrastructure are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-60011 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) found in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. The flaw arises when the affected device receives a specific optional, transitive BGP attribute over an established BGP session. Instead of correctly validating and propagating this attribute, the device erroneously modifies it before forwarding to its BGP peers. These peers then detect the attribute as malformed and typically respond by terminating the BGP session with the affected device. This termination leads to routing churn and an availability impact on downstream devices relying on these BGP sessions for routing information. The vulnerability can be exploited remotely by an unauthenticated attacker who can send crafted BGP updates, requiring no prior access or user interaction. The affected Junos OS versions include all releases before 22.4R3-S8, certain 23.2, 23.4, 24.2, and 24.4 versions, and corresponding Junos OS Evolved versions before their respective patch releases. The CVSS v3.1 base score is 5.8 (medium severity), reflecting network attack vector, no privileges required, no user interaction, and a scope change due to impact on downstream devices. Although no exploits are known in the wild yet, the vulnerability poses a risk of network instability and denial of service through BGP session disruption. Juniper has published patches in the indicated versions to address this issue.
Potential Impact
For European organizations, this vulnerability can lead to significant network availability issues, especially for those relying on Juniper routing devices for BGP peering and internet or inter-network connectivity. The forced termination of BGP sessions can cause routing instability, increased latency, packet loss, and potential outages of critical services dependent on stable network routes. This can affect ISPs, data centers, cloud providers, financial institutions, and enterprises with complex network topologies. The disruption of routing information propagation can also impact redundancy and failover mechanisms, increasing the risk of prolonged downtime. Given the unauthenticated nature of the exploit, attackers from outside the network perimeter can trigger these effects, raising concerns for border routers and peering points. The impact extends beyond a single device to downstream devices and networks relying on the affected BGP sessions, amplifying the scope of disruption. This can hinder business continuity, regulatory compliance (e.g., GDPR mandates on service availability), and damage organizational reputation.
Mitigation Recommendations
Organizations should prioritize upgrading Juniper Networks Junos OS and Junos OS Evolved to the fixed versions listed: 22.4R3-S8 or later, 23.2R2-S5 or later, 23.4R2-S6 or later, 24.2R2-S2 or later, and 24.4R2 or later, including their EVO counterparts. Network administrators should audit their routing infrastructure to identify affected devices and schedule maintenance windows for patch deployment. In parallel, implement strict BGP session filtering and validation controls to limit acceptance of unexpected or malformed BGP attributes from external peers. Employ BGP monitoring tools to detect abnormal session resets or routing churn indicative of exploitation attempts. Consider deploying route validation mechanisms such as RPKI to enhance BGP security posture. Network segmentation and limiting BGP session exposure to trusted peers can reduce attack surface. Maintain up-to-date backups of router configurations and have incident response plans ready for rapid remediation. Engage with Juniper support for guidance and monitor security advisories for any emerging exploit reports or additional mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.961Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69694e761ab3796b105000fa
Added to database: 1/15/2026, 8:30:46 PM
Last enriched: 1/22/2026, 9:33:29 PM
Last updated: 2/7/2026, 8:24:12 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.