CVE Vulnerabilities

CVE-2025-52964

Reachable Assertion

Published: Jul 11, 2025 | Modified: Jul 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).

When the device receives a specific BGP UPDATE packet, the rpd crashes and restarts. Continuous receipt of this specific packet will cause a sustained DoS condition.

For the issue to occur, BGP multipath with pause-computation-during-churn must be configured on the device, and the attacker must send the paths via a BGP UPDATE from a established BGP peer.

This issue affects: Junos OS:

  • All versions before 21.4R3-S7,
  • from 22.3 before 22.3R3-S3,
  • from 22.4 before 22.4R3-S5,
  • from 23.2 before 23.2R2,
  • from 23.4 before 23.4R2.

Junos OS Evolved:

  • All versions before 21.4R3-S7-EVO,
  • from 22.3 before 22.3R3-S3-EVO,
  • from 22.4 before 22.4R3-S5-EVO,
  • from 23.2 before 23.2R2-EVO,
  • from 23.4 before 23.4R2-EVO.

Weakness

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.

Extended Description

While assertion is good for catching logic errors and reducing the chances of reaching more serious vulnerability conditions, it can still lead to a denial of service. For example, if a server handles multiple simultaneous connections, and an assert() occurs in one single connection that causes all other connections to be dropped, this is a reachable assertion that leads to a denial of service.

Potential Mitigations

References