Vulnerability Details CVE-2025-52980
A Use of Incorrect Byte Ordering
vulnerability
in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.
This issue affects eBGP and iBGP over IPv4 and IPv6.
This issue affects:
Junos OS:
* 22.1 versions from 22.1R1 before 22.2R3-S4,
* 22.3 versions before 22.3R3-S3,
* 22.4 versions before 22.4R3-S2,
* 23.2 versions before 23.2R2,
* 23.4 versions before 23.4R2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.9%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-52980
-
cpe:2.3:h:juniper:srx300:-
-
cpe:2.3:h:juniper:srx320:-
-
cpe:2.3:h:juniper:srx340:-
-
cpe:2.3:h:juniper:srx345:-
-
cpe:2.3:h:juniper:srx380:-
-
cpe:2.3:o:juniper:junos:22.1
-
cpe:2.3:o:juniper:junos:22.3
-
cpe:2.3:o:juniper:junos:22.4
-
cpe:2.3:o:juniper:junos:23.2
-
cpe:2.3:o:juniper:junos:23.4