
CVE-2025-52989 – Junos OS and Junos OS Evolved: Annotate configuration command can be used to change the configuration
https://notcve.org/view.php?id=CVE-2025-52989
11 Jul 2025 — An Improper Neutralization of Delimiters vulnerability in the UI of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to modify the system configuration. A user with limited configuration and commit permissions, using a specifically crafted annotate configuration command, can change any part of the device configuration. This issue affects: Junos OS: * all versions before 22.2R3-S7, * 22.4 versions before 22.4R3-S7, * 23.2 versions before 23.2R2-S4, * ... • https://supportportal.juniper.net/JSA100096 • CWE-140: Improper Neutralization of Delimiters •

CVE-2025-52986 – Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks
https://notcve.org/view.php?id=CVE-2025-52986
11 Jul 2025 — A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB sharding is enabled and a user executes one of several routing related 'show' commands, a certain amount of memory is leaked. When all available memory has been consumed rpd will crash and restart. The leak can be monitored with the CLI command: show task mem... • https://supportportal.juniper.net/JSA100092 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2025-52963 – Junos OS: A low-privileged user can disable an interface
https://notcve.org/view.php?id=CVE-2025-52963
11 Jul 2025 — An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service. Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S11, * from 22.2 before 22.2R3-S7, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from ... • https://supportportal.juniper.net/JSA100078 • CWE-284: Improper Access Control •

CVE-2025-52953 – Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset
https://notcve.org/view.php?id=CVE-2025-52953
11 Jul 2025 — An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability. This issue affects Junos OS: * A... • https://supportportal.juniper.net/JSA100059 • CWE-440: Expected Behavior Violation •

CVE-2025-52951 – Junos OS: IPv6 firewall filter fails to match payload-protocol
https://notcve.org/view.php?id=CVE-2025-52951
11 Jul 2025 — A Protection Mechanism Failure vulnerability in kernel filter processing of Juniper Networks Junos OS allows an attacker sending IPv6 traffic to an interface to effectively bypass any firewall filtering configured on the interface. Due to an issue with Junos OS kernel filter processing, the 'payload-protocol' match is not being supported, causing any term containing it to accept all packets without taking any other action. In essence, these firewall filter terms were being processed as an 'accept' for all t... • https://supportportal.juniper.net/JSA100055 • CWE-693: Protection Mechanism Failure •

CVE-2025-52949 – Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed BGP update causes RPD crash
https://notcve.org/view.php?id=CVE-2025-52949
11 Jul 2025 — An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Only systems configured for Ethernet Virtual Private Networking (EVPN) signaling are vulnerab... • https://supportportal.juniper.net/JSA100053 • CWE-130: Improper Handling of Length Parameter Inconsistency •

CVE-2025-30661 – Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation
https://notcve.org/view.php?id=CVE-2025-30661
11 Jul 2025 — An Incorrect Permission Assignment for Critical Resource vulnerability in line card script processing of Juniper Networks Junos OS allows a local, low-privileged user to install scripts to be executed as root, leading to privilege escalation. A local user with access to the local file system can copy a script to the router in a way that will be executed as root, as the system boots. Execution of the script as root can lead to privilege escalation, potentially providing the adversary complete control of the ... • https://github.com/orangecertcc/security-research/security/advisories/GHSA-2p66-9j7x-fmch • CWE-732: Incorrect Permission Assignment for Critical Resource •