Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-52982

Publication date:
11/07/2025
An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC.<br /> This issue affects Junos OS:<br /> <br /> <br /> <br /> * all versions before 21.2R3-S9,<br /> * 21.4 versions from 21.4R1,<br /> * 22.2 versions before 22.2R3-S6,<br /> * 22.4 versions before 22.4R3-S6.<br /> <br /> <br /> <br /> <br /> As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected.<br /> <br /> This issue does not affect MX-SPC3 or SRX Series devices.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52983

Publication date:
11/07/2025
A UI Discrepancy for Security Feature<br /> <br /> vulnerability in the UI of Juniper Networks Junos OS on VM Host systems allows a network-based, unauthenticated attacker to access the device.<br /> <br /> <br /> <br /> On VM Host Routing Engines (RE), even if the configured public key for root has been removed, remote users which are in possession of the corresponding private key can still log in as root.<br /> This issue affects Junos OS:<br /> <br /> <br /> <br /> * all versions before 22.2R3-S7,<br /> * 22.4 versions before 22.4R3-S5,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2-S3,<br /> * 24.2 versions before 24.2R1-S2, 24.2R2.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52984

Publication date:
11/07/2025
A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device.<br /> <br /> When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts.<br /> <br /> This issue affects:<br /> <br /> Junos OS:  * all versions before 21.2R3-S9,<br /> * 21.4 versions before 21.4R3-S10, <br /> * 22.2 versions before 22.2R3-S6,<br /> * 22.4 versions before 22.4R3-S6,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2-S4,<br /> * 24.2 versions before 24.2R1-S2, 24.2R2;<br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * all versions before 22.4R3-S7-EVO,<br /> * 23.2-EVO <br /> <br /> versions before 23.2R2-S3-EVO,<br /> * 23.4-EVO versions before 23.4R2-S4-EVO,<br /> * 24.2-EVO versions before 24.2R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52985

Publication date:
11/07/2025
A Use of Incorrect Operator<br /> <br /> vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.<br /> <br /> When a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with &amp;#39;from prefix-list&amp;#39;, and that prefix list contains more than 10 entries, the prefix list doesn&amp;#39;t match and packets destined to or from the local device are not filtered.<br /> <br /> <br /> This issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.<br /> This issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.<br /> This issue affects Junos OS Evolved:<br /> <br /> * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,<br /> * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,<br /> * 24.2R2-EVO versions before 24.2R2-S1-EVO,<br /> * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.<br /> <br /> <br /> This issue doesn&amp;#39;t not affect Junos OS Evolved versions before 23.2R1-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
11/07/2025

CVE-2025-52980

Publication date:
11/07/2025
A Use of Incorrect Byte Ordering <br /> <br /> vulnerability <br /> <br /> in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> <br /> <br /> When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.<br /> <br /> This issue affects eBGP and iBGP over IPv4 and IPv6.<br /> <br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS:<br /> <br /> <br /> <br /> * 22.1 versions from 22.1R1 before 22.2R3-S4,<br /> * 22.3 versions before 22.3R3-S3,<br /> * 22.4 versions before 22.4R3-S2,<br /> * 23.2 versions before 23.2R2,<br /> * 23.4 versions before 23.4R2.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52994

Publication date:
11/07/2025
gif_outputAsJpeg in phpThumb through 1.7.23 allows phpthumb.gif.php OS Command Injection via a crafted parameter value. This is fixed in 1.7.23-202506081709.
Severity CVSS v4.0: Pending analysis
Last modification:
11/07/2025

CVE-2025-52953

Publication date:
11/07/2025
An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS). <br /> <br /> Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects Junos OS:<br /> <br /> <br /> * All versions before 21.2R3-S9,<br /> * from 21.4 before 21.4R3-S11,<br /> * from 22.2 before 22.2R3-S7,<br /> * from 22.4 before 22.4R3-S7,<br /> * from 23.2 before 23.2R2-S4,<br /> * from 23.4 before 23.4R2-S4,<br /> * from 24.2 before 24.2R2,<br /> * from 24.4 before 24.4R1-S3, 24.4R2<br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * All versions before 22.2R3-S7-EVO,<br /> * from 22.4-EVO before 22.4R3-S7-EVO,<br /> * from 23.2-EVO before 23.2R2-S4-EVO,<br /> * from 23.4-EVO before 23.4R2-S4-EVO,<br /> * from 24.2-EVO before 24.2R2-EVO,<br /> * from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52954

Publication date:
11/07/2025
A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise.<br /> <br /> Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system. <br /> <br /> This issue affects Junos OS Evolved: <br /> <br /> <br /> <br /> * All versions before 22.2R3-S7-EVO, <br /> * from 22.4 before 22.4R3-S7-EVO, <br /> * from 23.2 before 23.2R2-S4-EVO, <br /> * from 23.4 before 23.4R2-S5-EVO, <br /> * from 24.2 before 24.2R2-S1-EVO<br /> * from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52955

Publication date:
11/07/2025
An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a memory corruption that leads to a rpd crash. <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> When<br /> the logical interface using a routing instance flaps continuously, specific updates are sent to the jflow/sflow modules. This results in memory corruption, leading to an rpd crash and restart. <br /> <br /> <br /> Continued receipt of these specific updates will cause a sustained Denial of Service condition.<br /> <br /> <br /> This issue affects Junos OS:<br /> <br /> * All versions before 21.2R3-S9, <br /> * All versions of 21.4, <br /> * All versions of 22.2, <br /> * from 22.4 before 22.4R3-S7, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S4, <br /> * from 24.2 before 24.2R2.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025

CVE-2025-52958

Publication date:
11/07/2025
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.<br /> <br /> Continued session establishment failures leads to a sustained DoS condition. <br /> <br /> This issue affects Junos OS:<br /> <br /> * All versions before 22.2R3-S6, <br /> * from 22.4 before 22.4R3-S6, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S4, <br /> * from 24.2 before 24.2R2; <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> * All versions before 22.2R3-S6-EVO, <br /> * from 22.4 before 22.4R3-S6-EVO,<br /> * from 23.2 before 23.2R2-S3-EVO,<br /> * from 23.4 before 23.4R2-S4-EVO, <br /> * from 24.2 before 24.2R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
11/07/2025

CVE-2025-52963

Publication date:
11/07/2025
An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service.<br /> <br /> Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface.<br /> This issue affects Junos OS: <br /> <br /> <br /> * All versions before 21.2R3-S9, <br /> * from 21.4 before 21.4R3-S11, <br /> * from 22.2 before 22.2R3-S7,<br /> * from 22.4 before 22.4R3-S7, <br /> * from 23.2 before 23.2R2-S4,<br /> * from 23.4 before 23.4R2-S5,  <br /> * from 24.2 before 24.2R2-S1, <br /> * from 24.4 before 24.4R1-S3, 24.4R2.
Severity CVSS v4.0: MEDIUM
Last modification:
11/07/2025

CVE-2025-52964

Publication date:
11/07/2025
A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).<br /> <br /> When the device receives a specific BGP UPDATE packet, the rpd crashes and restarts. Continuous receipt of this specific packet will cause a sustained DoS condition.<br /> <br /> For the issue to occur, BGP multipath with "pause-computation-during-churn" must be configured on the device, and the attacker must send the paths via a BGP UPDATE from a established BGP peer.<br /> <br /> This issue affects:<br /> Junos OS: <br /> * All versions before 21.4R3-S7, <br /> * from 22.3 before 22.3R3-S3, <br /> * from 22.4 before 22.4R3-S5, <br /> * from 23.2 before 23.2R2, <br /> * from 23.4 before 23.4R2.<br /> <br /> <br /> <br /> Junos OS Evolved: <br /> * All versions before 21.4R3-S7-EVO, <br /> * from 22.3 before 22.3R3-S3-EVO, <br /> * from 22.4 before 22.4R3-S5-EVO, <br /> * from 23.2 before 23.2R2-EVO, <br /> * from 23.4 before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
11/07/2025