CVE-2025-21598

Severity CVSS v4.0:
HIGH
Type:
CWE-125 Out-of-bounds Read
Publication date:
09/01/2025
Last modified:
09/01/2025

Description

An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved&amp;#39;s routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.<br /> This issue affects:<br /> <br /> Junos OS: <br /> <br /> <br /> <br /> * from 21.2R3-S8 before 21.2R3-S9, <br /> * from 21.4R3-S7 before 21.4R3-S9, <br /> * from 22.2R3-S4 before 22.2R3-S5, <br /> * from 22.3R3-S2 before 22.3R3-S4, <br /> * from 22.4R3 before 22.4R3-S5, <br /> * from 23.2R2 before 23.2R2-S2, <br /> * from 23.4R1 before 23.4R2-S1, <br /> * from 24.2R1 before 24.2R1-S1, 24.2R2.<br /> <br /> <br /> Junos OS Evolved:<br /> * from 21.4R3-S7-EVO before 21.4R3-S9-EVO, <br /> * from 22.2R3-S4-EVO before 22.2R3-S5-EVO, <br /> * from 22.3R3-S2-EVO before 22.3R3-S4-EVO, <br /> * from 22.4R3-EVO before 22.4R3-S5-EVO, <br /> * from 23.2R2-EVO before 23.2R2-S2-EVO, <br /> * from 23.4R1-EVO before 23.4R2-S1-EVO, <br /> * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.<br /> <br /> <br /> This issue requires a BGP session to be established.<br /> <br /> This issue can propagate and multiply through multiple ASes until reaching vulnerable devices.<br /> <br /> This issue affects iBGP and eBGP.<br /> <br /> This issue affects IPv4 and IPv6.<br /> <br /> An indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue:<br /> <br /> For example, by issuing the command on the neighboring device:<br />  show log messages<br /> <br /> Reviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:<br />   rpd[]: Received malformed update from (External AS )<br /> and<br />   rpd[]: Malformed Attribute