CVE-2025-52955 – Juniper Networks Junos OS Buffer Overflow Denial of Service

An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a memory corruption that leads to a rpd crash.  When the logical interface using a routing instance flaps continuously, specific updates are sent to the jflow/sflow modules. This results in memory […]

CVE-2025-52954 – Juniper Networks Junos OS Evolved Missing Authorization Root Privilege Escalation Vulnerability

A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise. Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus […]

CVE-2025-52952 – Juniper Networks Junos OS CFM Daemon Out-of-Bounds Write Vulnerability

The following table lists the changes that have been made to the CVE-2025-52952 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 11, 2025 Action […]

CVE-2025-52951 – Juniper Networks Junos OS IPv6 Firewall Bypass Protection Mechanism Failure

A Protection Mechanism Failure vulnerability in kernel filter processing of Juniper Networks Junos OS allows an attacker sending IPv6 traffic to an interface to effectively bypass any firewall filtering configured on the interface. Due to an issue with Junos OS kernel filter processing, the ‘payload-protocol’ match is not being supported, causing any term containing it to […]

CVE-2025-52950 – Juniper Networks Security Director Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-52950 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jul. 11, 2025 Action […]