CVE Vulnerabilities

CVE-2025-30659

Improper Handling of Length Parameter Inconsistency

Published: Apr 09, 2025 | Modified: Jan 23, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Improper Handling of Length Parameter Inconsistency vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

When a device configured for Secure Vector Routing (SVR) receives a specifically malformed packet the PFE will crash and restart. This issue affects Junos OS on SRX Series:

  • All 21.4 versions,
  • 22.2 versions before 22.2R3-S6,
  • 22.4 versions before 22.4R3-S6,
  • 23.2 versions before 23.2R2-S3,
  • 23.4 versions before 23.4R2-S4,
  • 24.2 versions before 24.2R2.

This issue does not affect versions before 21.4.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

NameVendorStart VersionEnd Version
JunosJuniper21.4 (including)21.4 (including)
JunosJuniper22.2 (including)22.2 (including)
JunosJuniper22.2-r1 (including)22.2-r1 (including)
JunosJuniper22.2-r1-s1 (including)22.2-r1-s1 (including)
JunosJuniper22.2-r1-s2 (including)22.2-r1-s2 (including)
JunosJuniper22.2-r2 (including)22.2-r2 (including)
JunosJuniper22.2-r2-s1 (including)22.2-r2-s1 (including)
JunosJuniper22.2-r2-s2 (including)22.2-r2-s2 (including)
JunosJuniper22.2-r3 (including)22.2-r3 (including)
JunosJuniper22.2-r3-s1 (including)22.2-r3-s1 (including)
JunosJuniper22.2-r3-s2 (including)22.2-r3-s2 (including)
JunosJuniper22.2-r3-s3 (including)22.2-r3-s3 (including)
JunosJuniper22.2-r3-s4 (including)22.2-r3-s4 (including)
JunosJuniper22.2-r3-s5 (including)22.2-r3-s5 (including)
JunosJuniper22.4 (including)22.4 (including)
JunosJuniper22.4-r1 (including)22.4-r1 (including)
JunosJuniper22.4-r1-s1 (including)22.4-r1-s1 (including)
JunosJuniper22.4-r1-s2 (including)22.4-r1-s2 (including)
JunosJuniper22.4-r2 (including)22.4-r2 (including)
JunosJuniper22.4-r2-s1 (including)22.4-r2-s1 (including)
JunosJuniper22.4-r2-s2 (including)22.4-r2-s2 (including)
JunosJuniper22.4-r3 (including)22.4-r3 (including)
JunosJuniper22.4-r3-s1 (including)22.4-r3-s1 (including)
JunosJuniper22.4-r3-s2 (including)22.4-r3-s2 (including)
JunosJuniper22.4-r3-s3 (including)22.4-r3-s3 (including)
JunosJuniper22.4-r3-s4 (including)22.4-r3-s4 (including)
JunosJuniper22.4-r3-s5 (including)22.4-r3-s5 (including)
JunosJuniper23.2 (including)23.2 (including)
JunosJuniper23.2-r1 (including)23.2-r1 (including)
JunosJuniper23.2-r1-s1 (including)23.2-r1-s1 (including)
JunosJuniper23.2-r1-s2 (including)23.2-r1-s2 (including)
JunosJuniper23.2-r2 (including)23.2-r2 (including)
JunosJuniper23.2-r2-s1 (including)23.2-r2-s1 (including)
JunosJuniper23.2-r2-s2 (including)23.2-r2-s2 (including)
JunosJuniper23.4 (including)23.4 (including)
JunosJuniper23.4-r1 (including)23.4-r1 (including)
JunosJuniper23.4-r1-s1 (including)23.4-r1-s1 (including)
JunosJuniper23.4-r1-s2 (including)23.4-r1-s2 (including)
JunosJuniper23.4-r2 (including)23.4-r2 (including)
JunosJuniper23.4-r2-s1 (including)23.4-r2-s1 (including)
JunosJuniper23.4-r2-s2 (including)23.4-r2-s2 (including)
JunosJuniper23.4-r2-s3 (including)23.4-r2-s3 (including)
JunosJuniper24.2 (including)24.2 (including)
JunosJuniper24.2-r1 (including)24.2-r1 (including)
JunosJuniper24.2-r1-s1 (including)24.2-r1-s1 (including)
JunosJuniper24.2-r1-s2 (including)24.2-r1-s2 (including)

Potential Mitigations

References