Overview
The document discusses the critical cybersecurity vulnerability, CVE-2025-52980, which affects the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, specifically targeting the SRX300 series. The vulnerability can have severe implications, allowing an unauthenticated, network-based attacker to launch a Denial-of-Service (DoS) attack, potentially compromising the system and causing data leakage.
Vulnerability Summary
CVE ID: CVE-2025-52980
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: A successful exploit could result in a Denial-of-Service (DoS) attack, leading to potential system compromise or data leakage.
Affected Products
Product | Affected Versions
Junos OS | 22.1 versions from 22.1R1 before 22.2R3-S4
Junos OS | 22.3 versions before 22.3R3-S3
Junos OS | 22.4 versions before 22.4R3-S2
Junos OS | 23.2 versions before 23.2R2
Junos OS | 23.4 versions before 23.4R2
How the Exploit Works
The vulnerability is exploitable when a Border Gateway Protocol (BGP) update, containing a specific, valid, optional, transitive path attribute, is received over an established BGP session. This causes the Routing Protocol Daemon (rpd) to crash and restart, inducing a Denial-of-Service (DoS) state. This issue impacts both eBGP and iBGP over IPv4 and IPv6.
Conceptual Example Code
This is a conceptual representation of a malicious BGP update message that could potentially exploit the vulnerability. The specifics of the malicious optional transitive attribute are intentionally omitted.
bgp_update {
header {
marker: "...",
length: "...",
type: "UPDATE"
},
body {
withdrawn_routes: "...",
path_attributes {
flag: "OPTIONAL|TRANSITIVE",
type_code: "...",
value: "malicious_value"
},
nlri: "..."
}
}
