Executive Summary

Informations
Name CVE-2025-21600 First vendor Publication 2025-01-09
Vendor Cve Last vendor Modification 2025-01-27

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An Out-of-Bounds Read vulnerability in

the routing protocol daemon (rpd) of

Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

This issue only affects systems configured in
either of two ways:



* systems with BGP traceoptions enabled

* systems with BGP family traffic-engineering (BGP-LS)
configured

and can be exploited from a directly connected and configured BGP peer.Â

This issue affects iBGP and eBGP

with

any address family

configured, and both IPv4 and IPv6 are affected by this vulnerability.

This issue affects:

Junos OS:Â

*

from 21.4 before 21.4R3-S9,Â
* from 22.2 before 22.2R3-S5,Â
* from 22.3 before 22.3R3-S4,Â
* from 22.4 before 22.4R3-S5,Â
* from 23.2 before 23.2R2-S3,Â
* from 23.4 before 23.4R2-S3,Â
* from 24.2 before 24.2R1-S2, 24.2R2;Â

Junos OS Evolved:Â

* from 21.4-EVO before 21.4R3-S9-EVO,Â
* from 22.2-EVO before 22.2R3-S5-EVO,Â
* from 22.3-EVO before 22.3R3-S4-EVO,Â
* from 22.4-EVO before 22.4R3-S5-EVO,Â
* from 23.2-EVO before 23.2R2-S3-EVO,Â
* from 23.4-EVO before 23.4R2-S2-EVO,Â
* from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.

This issue does not affect versions of Junos OS prior to 21.3R1.

This issue does not affect versions of Junos OS Evolved prior to 21.3R1-EVO.

This is a similar, but different vulnerability than the issue reported as CVE-2024-39516.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21600

Sources (Detail)

https://supportportal.juniper.net/JSA92870
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-01-28 00:20:38
  • Multiple Updates
2025-01-09 21:20:27
  • First insertion