CVE-2025-60003

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
15/01/2026
Last modified:
15/01/2026

Description

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer.<br /> This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring:<br /> <br /> [ protocols bgp ... disable-4byte-as ]<br /> <br /> <br /> Established BGP sessions can be checked by executing:<br /> <br /> show bgp neighbor | match "4 byte AS"<br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> * all versions before 22.4R3-S8,<br /> * 23.2 versions before 23.2R2-S5,<br /> * 23.4 versions before 23.4R2-S6,<br /> * 24.2 versions before 24.2R2-S2,<br /> * 24.4 versions before 24.4R2;<br /> <br /> <br /> Junos OS Evolved: <br /> <br /> * all versions before 22.4R3-S8-EVO,<br /> * 23.2 versions before 23.2R2-S5-EVO,<br /> * 23.4 versions before 23.4R2-S6-EVO,<br /> * 24.2 versions before 24.2R2-S2-EVO,<br /> * 24.4 versions before 24.4R2-EVO.