CVE-2025-30653 – Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (rpd) Expired Pointer Dereference Denial of Service (DoS)

An Expired Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).On all Junos OS and Junos OS Evolved platforms, when an MPLS Label-Switched Path (LSP) is configured with node-link-protection and transport-class, and an LSP flaps, rpd […]

CVE-2025-30648 – Juniper Junos OS Juniper DHCP Daemon Denial of Service

An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS). When a specifically malformed DHCP packet is received from a DHCP client, the jdhcpd process crashes, which will […]

CVE-2025-30647 – Juniper Networks Junos OS MX Series Memory Leak DoS Vulnerability

The following table lists the changes that have been made to the CVE-2025-30647 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 09, 2025 Action […]

CVE-2025-30652 – Juniper Networks Junos OS and Junos OS Evolved Denial of Service Vulnerability in Routing Protocol Daemon (rpd)

An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS). When asregex-optimized is configured and a specific “show route as-path” CLI command is executed, the rpd crashes and restarts. Repeated […]

CVE-2025-30651 – Juniper Networks Junos OS and Junos OS Evolved Router Advertisement Protocol Buffer Access Denial of Service Vulnerability

A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When an attacker sends a specific ICMPv6 packet to an interface with “protocols router-advertisement” configured, rpd crashes and restarts. Continued […]

CVE-2025-30649 – “Juniper Networks Junos OS syslog stream TCP transport Improper Input Validation allows CPU Denial of Service”

An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs. Continued receipt and processing of these specific packets […]

CVE-2025-2632 – NI LabVIEW CPU Info Disclosure and Code Execution

The following table lists the changes that have been made to the CVE-2025-2632 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 09, 2025 Action […]