CVE-2025-60003
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
15/01/2026
Last modified:
15/01/2026
Description
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br />
<br />
When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer.<br />
This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring:<br />
<br />
[ protocols bgp ... disable-4byte-as ]<br />
<br />
<br />
Established BGP sessions can be checked by executing:<br />
<br />
show bgp neighbor | match "4 byte AS"<br />
<br />
<br />
This issue affects:<br />
<br />
Junos OS: <br />
<br />
* all versions before 22.4R3-S8,<br />
* 23.2 versions before 23.2R2-S5,<br />
* 23.4 versions before 23.4R2-S6,<br />
* 24.2 versions before 24.2R2-S2,<br />
* 24.4 versions before 24.4R2;<br />
<br />
<br />
Junos OS Evolved: <br />
<br />
* all versions before 22.4R3-S8-EVO,<br />
* 23.2 versions before 23.2R2-S5-EVO,<br />
* 23.4 versions before 23.4R2-S6-EVO,<br />
* 24.2 versions before 24.2R2-S2-EVO,<br />
* 24.4 versions before 24.4R2-EVO.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH



