Unknown
CVE-2025-21598
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2025-21598
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved’s routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.
This issue affects:
Junos OS:
- from 21.2R3-S8 before 21.2R3-S9,
- from 21.4R3-S7 before 21.4R3-S9,
- from 22.2R3-S4 before 22.2R3-S5,
- from 22.3R3-S2 before 22.3R3-S4,
- from 22.4R3 before 22.4R3-S5,
- from 23.2R2 before 23.2R2-S2,
- from 23.4R1 before 23.4R2-S1,
- from 24.2R1 before 24.2R1-S1, 24.2R2.
Junos OS Evolved:
- from 21.4R3-S7-EVO before 21.4R3-S9-EVO,
- from 22.2R3-S4-EVO before 22.2R3-S5-EVO,
- from 22.3R3-S2-EVO before 22.3R3-S4-EVO,
- from 22.4R3-EVO before 22.4R3-S5-EVO,
- from 23.2R2-EVO before 23.2R2-S2-EVO,
- from 23.4R1-EVO before 23.4R2-S1-EVO,
- from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.
This issue requires a BGP session to be established.
This issue can propagate and multiply through multiple ASes until reaching vulnerable devices.
This issue affects iBGP and eBGP.
This issue affects IPv4 and IPv6.
An indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue:
For example, by issuing the command on the neighboring device:
show log messages
Reviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:
rpd[<pid>
]: Received malformed update from <IP address>
(External AS <AS#>
)
and
rpd[<pid>
]: Malformed Attribute
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- Juniper Networks
Products
- Junos OS,
- Junos OS Evolved
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: