- Description
- An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue doesn't not affected Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected.
- Source
- sirt@juniper.net
- NVD status
- Analyzed
- Products
- junos, junos_os_evolved
CVSS 4.0
- Type
- Secondary
- Base score
- 7.1
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:C/RE:M/U:Green
- Severity
- HIGH
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
- sirt@juniper.net
- CWE-20
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*",
"matchCriteriaId": "1B7572BB-9C77-4214-9C5F-CC83C7B93E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "CAADBF98-38BE-40E2-AF1B-9077DCED0809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "558F0A4C-0C72-4BF1-B2DE-C0D3BFD54BCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "127FE528-AB27-4B18-AF3B-1BE7C0AEEE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*",
"matchCriteriaId": "DAF96553-DB70-4DFA-8658-306A7477DD06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "83C415EF-E87B-4259-A836-59B3A9C3914B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "AFD32E67-9D8D-437D-96BC-CA97A1F686BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "0E5D9967-1B53-427B-9B23-77DC399F3D71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]