CVE-2025-52985

Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
11/07/2025
Last modified:
23/01/2026

Description

A Use of Incorrect Operator<br /> <br /> vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions.<br /> <br /> When a firewall filter which is applied to the lo0 or re:mgmt interface references a prefix list with &amp;#39;from prefix-list&amp;#39;, and that prefix list contains more than 10 entries, the prefix list doesn&amp;#39;t match and packets destined to or from the local device are not filtered.<br /> <br /> <br /> This issue affects firewall filters applied to the re:mgmt interfaces as input and output, but only affects firewall filters applied to the lo0 interface as output.<br /> This issue is applicable to IPv4 and IPv6 as a prefix list can contain IPv4 and IPv6 prefixes.<br /> This issue affects Junos OS Evolved:<br /> <br /> * 23.2R2-S3-EVO versions before 23.2R2-S4-EVO,<br /> * 23.4R2-S3-EVO versions before 23.4R2-S5-EVO,<br /> * 24.2R2-EVO versions before 24.2R2-S1-EVO,<br /> * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.<br /> <br /> <br /> This issue doesn&amp;#39;t affect Junos OS Evolved versions before 23.2R1-EVO.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:*


References to Advisories, Solutions, and Tools