Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-59958

Опубликовано: 09 окт. 2025
Источник: nvd
CVSS3: 6.5
EPSS Низкий

Описание

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to cause impact to confidentiality and availability.

When an output firewall filter is configured with one or more terms where the action is 'reject', packets matching these terms are erroneously sent to the Routing Engine (RE) and further processed there. Processing of these packets will consume limited RE resources. Also responses from the RE back to the source of this traffic could reveal confidential information about the affected device. This issue only applies to firewall filters applied to WAN or revenue interfaces, so not the mgmt or lo0 interface of the routing-engine, nor any input filters.

This issue affects Junos OS Evolved on PTX Series:

  • all versions before 22.4R3-EVO,
  • 23.2 versions before 23.2R2-EVO.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*
Версия до 22.4 (исключая)
cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*

Одно из

cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*

EPSS

Процентиль: 18%
0.00059
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-754

Связанные уязвимости

CVSS3: 6.5
github
4 месяца назад

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to cause impact to confidentiality and availability. When an output firewall filter is configured with one or more terms where the action is 'reject', packets matching these terms are erroneously sent to the Routing Engine (RE) and further processed there. Processing of these packets will consume limited RE resources. Also responses from the RE back to the source of this traffic could reveal confidential information about the affected device. This issue only applies to firewall filters applied to WAN or revenue interfaces, so not the mgmt or lo0 interface of the routing-engine, nor any input filters. This issue affects Junos OS Evolved on PTX Series: * all versions before 22.4R3-EVO, * 23.2 versions before 23.2R2-EVO.

EPSS

Процентиль: 18%
0.00059
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-754