CVE-2025-59969
Severity CVSS v4.0:
HIGH
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
09/04/2026
Last modified:
09/04/2026
Description
A Buffer Copy without Checking Size of Input (&#39;Classic Buffer Overflow&#39;) vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition.<br />
<br />
This issue affects Junos OS Evolved PTX Series:<br />
<br />
<br />
<br />
* All versions before 22.4R3-S8-EVO,<br />
* from 23.2 before 23.2R2-S5-EVO,<br />
* from 23.4 before 23.4R2-EVO,<br />
* from 24.2 before 24.2R2-EVO,<br />
* from 24.4 before 24.4R2-EVO.<br />
<br />
<br />
<br />
<br />
This issue affects Junos OS Evolved on QFX5000 Series:<br />
<br />
<br />
<br />
* 22.2-EVO version before 22.2R3-S7-EVO,<br />
* 22.4-EVO version before 22.4R3-S7-EVO,<br />
* 23.2-EVO versions before 23.2R2-S4-EVO,<br />
* 23.4-EVO versions before 23.4R2-S5-EVO, <br />
* 24.2-EVO versions before 24.2R2-S1-EVO,<br />
* 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.<br />
<br />
<br />
This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.
Impact
Base Score 4.0
7.10
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM



