CVE Vulnerabilities

CVE-2025-59959

Untrusted Pointer Dereference

Published: Jan 15, 2026 | Modified: Jan 23, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS).

When the command show route < ( receive-protocol | advertising-protocol ) bgp > detail is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart. show route … extensive is not affected.

This issue affects:

Junos OS: 

  • all versions before 22.4R3-S8,
  • 23.2 versions before 23.2R2-S5,
  • 23.4 versions before 23.4R2-S5,
  • 24.2 versions before 24.2R2-S2,
  • 24.4 versions before 24.4R2;

Junos OS Evolved:

  • all versions before 22.4R3-S8-EVO, 
  • 23.2 versions before 23.2R2-S5-EVO,
  • 23.4 versions before 23.4R2-S6-EVO,
  • 24.2 versions before 24.2R2-S2-EVO,
  • 24.4 versions before 24.4R2-EVO.

Weakness

The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.

Affected Software

NameVendorStart VersionEnd Version
JunosJuniper*22.4 (excluding)
JunosJuniper22.4 (including)22.4 (including)
JunosJuniper22.4-r1 (including)22.4-r1 (including)
JunosJuniper22.4-r1-s1 (including)22.4-r1-s1 (including)
JunosJuniper22.4-r1-s2 (including)22.4-r1-s2 (including)
JunosJuniper22.4-r2 (including)22.4-r2 (including)
JunosJuniper22.4-r2-s1 (including)22.4-r2-s1 (including)
JunosJuniper22.4-r2-s2 (including)22.4-r2-s2 (including)
JunosJuniper22.4-r3 (including)22.4-r3 (including)
JunosJuniper22.4-r3-s1 (including)22.4-r3-s1 (including)
JunosJuniper22.4-r3-s2 (including)22.4-r3-s2 (including)
JunosJuniper22.4-r3-s3 (including)22.4-r3-s3 (including)
JunosJuniper22.4-r3-s4 (including)22.4-r3-s4 (including)
JunosJuniper22.4-r3-s5 (including)22.4-r3-s5 (including)
JunosJuniper22.4-r3-s6 (including)22.4-r3-s6 (including)
JunosJuniper22.4-r3-s7 (including)22.4-r3-s7 (including)
JunosJuniper23.2 (including)23.2 (including)
JunosJuniper23.2-r1 (including)23.2-r1 (including)
JunosJuniper23.2-r1-s1 (including)23.2-r1-s1 (including)
JunosJuniper23.2-r1-s2 (including)23.2-r1-s2 (including)
JunosJuniper23.2-r2 (including)23.2-r2 (including)
JunosJuniper23.2-r2-s1 (including)23.2-r2-s1 (including)
JunosJuniper23.2-r2-s2 (including)23.2-r2-s2 (including)
JunosJuniper23.2-r2-s3 (including)23.2-r2-s3 (including)
JunosJuniper23.2-r2-s4 (including)23.2-r2-s4 (including)
JunosJuniper23.4 (including)23.4 (including)
JunosJuniper23.4-r1 (including)23.4-r1 (including)
JunosJuniper23.4-r1-s1 (including)23.4-r1-s1 (including)
JunosJuniper23.4-r1-s2 (including)23.4-r1-s2 (including)
JunosJuniper23.4-r2 (including)23.4-r2 (including)
JunosJuniper23.4-r2-s1 (including)23.4-r2-s1 (including)
JunosJuniper23.4-r2-s2 (including)23.4-r2-s2 (including)
JunosJuniper23.4-r2-s3 (including)23.4-r2-s3 (including)
JunosJuniper23.4-r2-s4 (including)23.4-r2-s4 (including)
JunosJuniper24.2 (including)24.2 (including)
JunosJuniper24.2-r1 (including)24.2-r1 (including)
JunosJuniper24.2-r1-s1 (including)24.2-r1-s1 (including)
JunosJuniper24.2-r1-s2 (including)24.2-r1-s2 (including)
JunosJuniper24.2-r2 (including)24.2-r2 (including)
JunosJuniper24.2-r2-s1 (including)24.2-r2-s1 (including)
JunosJuniper24.4 (including)24.4 (including)
JunosJuniper24.4-r1 (including)24.4-r1 (including)
JunosJuniper24.4-r1-s2 (including)24.4-r1-s2 (including)
JunosJuniper24.4-r1-s3 (including)24.4-r1-s3 (including)
Junos_os_evolvedJuniper*22.4 (excluding)
Junos_os_evolvedJuniper22.4 (including)22.4 (including)
Junos_os_evolvedJuniper22.4-r1 (including)22.4-r1 (including)
Junos_os_evolvedJuniper22.4-r1-s1 (including)22.4-r1-s1 (including)
Junos_os_evolvedJuniper22.4-r1-s2 (including)22.4-r1-s2 (including)
Junos_os_evolvedJuniper22.4-r2 (including)22.4-r2 (including)
Junos_os_evolvedJuniper22.4-r2-s1 (including)22.4-r2-s1 (including)
Junos_os_evolvedJuniper22.4-r2-s2 (including)22.4-r2-s2 (including)
Junos_os_evolvedJuniper22.4-r3 (including)22.4-r3 (including)
Junos_os_evolvedJuniper22.4-r3-s1 (including)22.4-r3-s1 (including)
Junos_os_evolvedJuniper22.4-r3-s2 (including)22.4-r3-s2 (including)
Junos_os_evolvedJuniper22.4-r3-s3 (including)22.4-r3-s3 (including)
Junos_os_evolvedJuniper22.4-r3-s4 (including)22.4-r3-s4 (including)
Junos_os_evolvedJuniper22.4-r3-s5 (including)22.4-r3-s5 (including)
Junos_os_evolvedJuniper22.4-r3-s6 (including)22.4-r3-s6 (including)
Junos_os_evolvedJuniper22.4-r3-s7 (including)22.4-r3-s7 (including)
Junos_os_evolvedJuniper23.2 (including)23.2 (including)
Junos_os_evolvedJuniper23.2-r1 (including)23.2-r1 (including)
Junos_os_evolvedJuniper23.2-r1-s1 (including)23.2-r1-s1 (including)
Junos_os_evolvedJuniper23.2-r1-s2 (including)23.2-r1-s2 (including)
Junos_os_evolvedJuniper23.2-r2 (including)23.2-r2 (including)
Junos_os_evolvedJuniper23.2-r2-s1 (including)23.2-r2-s1 (including)
Junos_os_evolvedJuniper23.2-r2-s2 (including)23.2-r2-s2 (including)
Junos_os_evolvedJuniper23.2-r2-s3 (including)23.2-r2-s3 (including)
Junos_os_evolvedJuniper23.2-r2-s4 (including)23.2-r2-s4 (including)
Junos_os_evolvedJuniper23.4 (including)23.4 (including)
Junos_os_evolvedJuniper23.4-r1 (including)23.4-r1 (including)
Junos_os_evolvedJuniper23.4-r1-s1 (including)23.4-r1-s1 (including)
Junos_os_evolvedJuniper23.4-r1-s2 (including)23.4-r1-s2 (including)
Junos_os_evolvedJuniper23.4-r2 (including)23.4-r2 (including)
Junos_os_evolvedJuniper23.4-r2-s1 (including)23.4-r2-s1 (including)
Junos_os_evolvedJuniper23.4-r2-s2 (including)23.4-r2-s2 (including)
Junos_os_evolvedJuniper23.4-r2-s3 (including)23.4-r2-s3 (including)
Junos_os_evolvedJuniper23.4-r2-s4 (including)23.4-r2-s4 (including)
Junos_os_evolvedJuniper23.4-r2-s5 (including)23.4-r2-s5 (including)
Junos_os_evolvedJuniper24.2 (including)24.2 (including)
Junos_os_evolvedJuniper24.2-r1 (including)24.2-r1 (including)
Junos_os_evolvedJuniper24.2-r1-s2 (including)24.2-r1-s2 (including)
Junos_os_evolvedJuniper24.2-r2 (including)24.2-r2 (including)
Junos_os_evolvedJuniper24.2-r2-s1 (including)24.2-r2-s1 (including)
Junos_os_evolvedJuniper24.4 (including)24.4 (including)
Junos_os_evolvedJuniper24.4-r1 (including)24.4-r1 (including)
Junos_os_evolvedJuniper24.4-r1-s2 (including)24.4-r1-s2 (including)
Junos_os_evolvedJuniper24.4-r1-s3 (including)24.4-r1-s3 (including)

Extended Description

An attacker can supply a pointer for memory locations that the product is not expecting. If the pointer is dereferenced for a write operation, the attack might allow modification of critical state variables, cause a crash, or execute code. If the dereferencing operation is for a read, then the attack might allow reading of sensitive data, cause a crash, or set a variable to an unexpected value (since the value will be read from an unexpected memory location). There are several variants of this weakness, including but not necessarily limited to:

References