Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-52983

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A UI Discrepancy for Security Feature<br /> <br /> vulnerability in the UI of Juniper Networks Junos OS on VM Host systems allows a network-based, unauthenticated attacker to access the device.<br /> <br /> <br /> <br /> On VM Host Routing Engines (RE), even if the configured public key for root has been removed, remote users which are in possession of the corresponding private key can still log in as root.<br /> This issue affects Junos OS:<br /> <br /> <br /> <br /> * all versions before 22.2R3-S7,<br /> * 22.4 versions before 22.4R3-S5,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2-S3,<br /> * 24.2 versions before 24.2R1-S2, 24.2R2.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52984

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device.<br /> <br /> When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts.<br /> <br /> This issue affects:<br /> <br /> Junos OS:  * all versions before 21.2R3-S9,<br /> * 21.4 versions before 21.4R3-S10, <br /> * 22.2 versions before 22.2R3-S6,<br /> * 22.4 versions before 22.4R3-S6,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2-S4,<br /> * 24.2 versions before 24.2R1-S2, 24.2R2;<br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * all versions before 22.4R3-S7-EVO,<br /> * 23.2-EVO <br /> <br /> versions before 23.2R2-S3-EVO,<br /> * 23.4-EVO versions before 23.4R2-S4-EVO,<br /> * 24.2-EVO versions before 24.2R2-EVO.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52985

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A Use of Incorrect Operator<br /> <br /> vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.<br /> <br /> When a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with &amp;#39;from prefix-list&amp;#39;, and that prefix list contains more than 10 entries, the prefix list doesn&amp;#39;t match and packets destined to or from the local device are not filtered.<br /> <br /> <br /> This issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.<br /> This issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.<br /> This issue affects Junos OS Evolved:<br /> <br /> * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,<br /> * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,<br /> * 24.2R2-EVO versions before 24.2R2-S1-EVO,<br /> * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.<br /> <br /> <br /> This issue doesn&amp;#39;t not affect Junos OS Evolved versions before 23.2R1-EVO.
Gravedad CVSS v4.0: MEDIA
Última modificación:
11/07/2025

CVE-2025-52980

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A Use of Incorrect Byte Ordering <br /> <br /> vulnerability <br /> <br /> in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> <br /> <br /> When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.<br /> <br /> This issue affects eBGP and iBGP over IPv4 and IPv6.<br /> <br /> <br /> <br /> This issue affects:<br /> <br /> Junos OS:<br /> <br /> <br /> <br /> * 22.1 versions from 22.1R1 before 22.2R3-S4,<br /> * 22.3 versions before 22.3R3-S3,<br /> * 22.4 versions before 22.4R3-S2,<br /> * 23.2 versions before 23.2R2,<br /> * 23.4 versions before 23.4R2.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52994

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** gif_outputAsJpeg in phpThumb through 1.7.23 allows phpthumb.gif.php OS Command Injection via a crafted parameter value. This is fixed in 1.7.23-202506081709.
Gravedad CVSS v3.1: MEDIA
Última modificación:
11/07/2025

CVE-2025-52953

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS). <br /> <br /> Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability.<br /> <br /> This issue affects Junos OS:<br /> <br /> <br /> * All versions before 21.2R3-S9,<br /> * from 21.4 before 21.4R3-S11,<br /> * from 22.2 before 22.2R3-S7,<br /> * from 22.4 before 22.4R3-S7,<br /> * from 23.2 before 23.2R2-S4,<br /> * from 23.4 before 23.4R2-S4,<br /> * from 24.2 before 24.2R2,<br /> * from 24.4 before 24.4R1-S3, 24.4R2<br /> <br /> <br /> Junos OS Evolved:<br /> <br /> <br /> <br /> * All versions before 22.2R3-S7-EVO,<br /> * from 22.4-EVO before 22.4R3-S7-EVO,<br /> * from 23.2-EVO before 23.2R2-S4-EVO,<br /> * from 23.4-EVO before 23.4R2-S4-EVO,<br /> * from 24.2-EVO before 24.2R2-EVO,<br /> * from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52954

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise.<br /> <br /> Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system. <br /> <br /> This issue affects Junos OS Evolved: <br /> <br /> <br /> <br /> * All versions before 22.2R3-S7-EVO, <br /> * from 22.4 before 22.4R3-S7-EVO, <br /> * from 23.2 before 23.2R2-S4-EVO, <br /> * from 23.4 before 23.4R2-S5-EVO, <br /> * from 24.2 before 24.2R2-S1-EVO<br /> * from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52955

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a memory corruption that leads to a rpd crash. <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> When<br /> the logical interface using a routing instance flaps continuously, specific updates are sent to the jflow/sflow modules. This results in memory corruption, leading to an rpd crash and restart. <br /> <br /> <br /> Continued receipt of these specific updates will cause a sustained Denial of Service condition.<br /> <br /> <br /> This issue affects Junos OS:<br /> <br /> * All versions before 21.2R3-S9, <br /> * All versions of 21.4, <br /> * All versions of 22.2, <br /> * from 22.4 before 22.4R3-S7, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S4, <br /> * from 24.2 before 24.2R2.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52958

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when route validation is enabled, a rare condition during BGP initial session establishment can lead to an rpd crash and restart. This occurs specifically when the connection request fails during error-handling scenario.<br /> <br /> Continued session establishment failures leads to a sustained DoS condition. <br /> <br /> This issue affects Junos OS:<br /> <br /> * All versions before 22.2R3-S6, <br /> * from 22.4 before 22.4R3-S6, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S4, <br /> * from 24.2 before 24.2R2; <br /> <br /> <br /> <br /> Junos OS Evolved: <br /> * All versions before 22.2R3-S6-EVO, <br /> * from 22.4 before 22.4R3-S6-EVO,<br /> * from 23.2 before 23.2R2-S3-EVO,<br /> * from 23.4 before 23.4R2-S4-EVO, <br /> * from 24.2 before 24.2R2-EVO.
Gravedad CVSS v4.0: MEDIA
Última modificación:
11/07/2025

CVE-2025-52963

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service.<br /> <br /> Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface.<br /> This issue affects Junos OS: <br /> <br /> <br /> * All versions before 21.2R3-S9, <br /> * from 21.4 before 21.4R3-S11, <br /> * from 22.2 before 22.2R3-S7,<br /> * from 22.4 before 22.4R3-S7, <br /> * from 23.2 before 23.2R2-S4,<br /> * from 23.4 before 23.4R2-S5,  <br /> * from 24.2 before 24.2R2-S1, <br /> * from 24.4 before 24.4R1-S3, 24.4R2.
Gravedad CVSS v4.0: MEDIA
Última modificación:
11/07/2025

CVE-2025-52964

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).<br /> <br /> When the device receives a specific BGP UPDATE packet, the rpd crashes and restarts. Continuous receipt of this specific packet will cause a sustained DoS condition.<br /> <br /> For the issue to occur, BGP multipath with "pause-computation-during-churn" must be configured on the device, and the attacker must send the paths via a BGP UPDATE from a established BGP peer.<br /> <br /> This issue affects:<br /> Junos OS: <br /> * All versions before 21.4R3-S7, <br /> * from 22.3 before 22.3R3-S3, <br /> * from 22.4 before 22.4R3-S5, <br /> * from 23.2 before 23.2R2, <br /> * from 23.4 before 23.4R2.<br /> <br /> <br /> <br /> Junos OS Evolved: <br /> * All versions before 21.4R3-S7-EVO, <br /> * from 22.3 before 22.3R3-S3-EVO, <br /> * from 22.4 before 22.4R3-S5-EVO, <br /> * from 23.2 before 23.2R2-EVO, <br /> * from 23.4 before 23.4R2-EVO.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025

CVE-2025-52947

Fecha de publicación:
11/07/2025
Idioma:
Inglés
*** Pendiente de traducción *** An Improper Handling of Exceptional Conditions vulnerability in route processing of Juniper Networks Junos OS on specific end-of-life (EOL) ACX Series platforms allows an attacker to crash the Forwarding Engine Board (FEB) by flapping an interface, leading to a Denial of Service (DoS).<br /> <br /> On ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096 devices, FEB0 will crash when the primary path port of the L2 circuit IGP (Interior Gateway Protocol) on the local device goes down. This issue is seen only when &amp;#39;hot-standby&amp;#39; mode is configured for the L2 circuit.<br /> <br /> This issue affects Junos OS on ACX1000, ACX1100, ACX2000, ACX2100, ACX2200, ACX4000, ACX5048, and ACX5096: <br /> <br /> <br /> <br /> * all versions before 21.2R3-S9.
Gravedad CVSS v4.0: ALTA
Última modificación:
11/07/2025