Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-21598

Опубликовано: 09 янв. 2025
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd. This issue affects:

Junos OS: 

  • from 21.2R3-S8 before 21.2R3-S9, 
  • from 21.4R3-S7 before 21.4R3-S9, 
  • from 22.2R3-S4 before 22.2R3-S5, 
  • from 22.3R3-S2 before 22.3R3-S4, 
  • from 22.4R3 before 22.4R3-S5, 
  • from 23.2R2 before 23.2R2-S2, 
  • from 23.4R1 before 23.4R2-S1, 
  • from 24.2R1 before 24.2R1-S1, 24.2R2.

Junos OS Evolved:

  • from 21.4R3-S7-EVO before 21.4R3-S9-EVO, 
  • from 22.2R3-S4-EVO before 22.2R3-S5-EVO, 
  • from 22.3R3-S2-EVO before 22.3R3-S4-EVO, 
  • from 22.4R3-EVO before 22.4R3-S5-EVO, 
  • from 23.2R2-EVO before 23.2R2-S2-EVO, 
  • from 23.4R1-EVO before 23.4R2-S1-EVO, 
  • from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.

This issue requ

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:juniper:junos:21.2:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.3:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:24.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*

EPSS

Процентиль: 52%
0.00291
Низкий

7.5 High

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 7.5
github
около 1 года назад

An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd. This issue affects: Junos OS:  * from 21.2R3-S8 before 21.2R3-S9,  * from 21.4R3-S7 before 21.4R3-S9,  * from 22.2R3-S4 before 22.2R3-S5,  * from 22.3R3-S2 before 22.3R3-S4,  * from 22.4R3 before 22.4R3-S5,  * from 23.2R2 before 23.2R2-S2,  * from 23.4R1 before 23.4R2-S1,  * from 24.2R1 before 24.2R1-S1, 24.2R2. Junos OS Evolved: * from 21.4R3-S7-EVO before 21.4R3-S9-EVO,  * from 22.2R3-S4-EVO before 22.2R3-S5-EVO,  * from 22.3R3-S2-EVO before 22.3R3-S4-EVO,  * from 22.4R3-EVO before 22.4R3-S5-EVO,  * from 23.2R2-EVO before 23.2R2-S2-EVO,  * from 23.4R1-EVO before 23.4R2-S1-EVO,  * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue r...

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость демона, реализующего протоколы маршрутизации (rpd) операционных систем Junos OS и Junos OS Evolved, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 52%
0.00291
Низкий

7.5 High

CVSS3

Дефекты

CWE-125