CVE Vulnerabilities

CVE-2025-59960

Improper Check for Unusual or Exceptional Conditions

Published: Jan 15, 2026 | Modified: Jan 23, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to a Denial of Service (DoS) on the downstream DHCP server.

By default, the DHCP relay agent inserts its own Option 82 information when forwarding client requests, optionally replacing any Option 82 information provided by the client. When a specific DHCP DISCOVER is received in forward-only mode with Option 82, the device should drop the message unless trust-option82 is configured. Instead, the DHCP relay forwards these packets to the DHCP server unmodified, which uses up addresses in the DHCP servers address pool, ultimately leading to address pool exhaustion.

This issue affects Junos OS: 

  • all versions before 21.2R3-S10,
  • from 21.4 before 21.4R3-S12,
  • all versions of 22.2,
  • from 22.4 before 22.4R3-S8, 
  • from 23.2 before 23.2R2-S5, 
  • from 23.4 before 23.4R2-S6, 
  • from 24.2 before 24.2R2-S2, 
  • from 24.4 before 24.4R2, 
  • from 25.2 before 25.2R1-S1, 25.2R2.

Junos OS Evolved:

  • all versions before 21.4R3-S12-EVO, 
  • all versions of 22.2-EVO,
  • from 22.4 before 22.4R3-S8-EVO, 
  • from 23.2 before 23.2R2-S5-EVO, 
  • from 23.4 before 23.4R2-S6-EVO, 
  • from 24.2 before 24.2R2-S2-EVO, 
  • from 24.4 before 24.4R2-EVO, 
  • from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.

Weakness

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.

Affected Software

NameVendorStart VersionEnd Version
JunosJuniper*21.2 (excluding)
JunosJuniper21.2 (including)21.2 (including)
JunosJuniper21.2-r1 (including)21.2-r1 (including)
JunosJuniper21.2-r1-s1 (including)21.2-r1-s1 (including)
JunosJuniper21.2-r1-s2 (including)21.2-r1-s2 (including)
JunosJuniper21.2-r2 (including)21.2-r2 (including)
JunosJuniper21.2-r2-s1 (including)21.2-r2-s1 (including)
JunosJuniper21.2-r2-s2 (including)21.2-r2-s2 (including)
JunosJuniper21.2-r3 (including)21.2-r3 (including)
JunosJuniper21.2-r3-s1 (including)21.2-r3-s1 (including)
JunosJuniper21.2-r3-s2 (including)21.2-r3-s2 (including)
JunosJuniper21.2-r3-s3 (including)21.2-r3-s3 (including)
JunosJuniper21.2-r3-s4 (including)21.2-r3-s4 (including)
JunosJuniper21.2-r3-s5 (including)21.2-r3-s5 (including)
JunosJuniper21.2-r3-s6 (including)21.2-r3-s6 (including)
JunosJuniper21.2-r3-s7 (including)21.2-r3-s7 (including)
JunosJuniper21.2-r3-s8 (including)21.2-r3-s8 (including)
JunosJuniper21.2-r3-s9 (including)21.2-r3-s9 (including)
JunosJuniper21.4 (including)21.4 (including)
JunosJuniper21.4-r1 (including)21.4-r1 (including)
JunosJuniper21.4-r1-s1 (including)21.4-r1-s1 (including)
JunosJuniper21.4-r1-s2 (including)21.4-r1-s2 (including)
JunosJuniper21.4-r2 (including)21.4-r2 (including)
JunosJuniper21.4-r2-s1 (including)21.4-r2-s1 (including)
JunosJuniper21.4-r2-s2 (including)21.4-r2-s2 (including)
JunosJuniper21.4-r3 (including)21.4-r3 (including)
JunosJuniper21.4-r3-s1 (including)21.4-r3-s1 (including)
JunosJuniper21.4-r3-s10 (including)21.4-r3-s10 (including)
JunosJuniper21.4-r3-s11 (including)21.4-r3-s11 (including)
JunosJuniper21.4-r3-s2 (including)21.4-r3-s2 (including)
JunosJuniper21.4-r3-s3 (including)21.4-r3-s3 (including)
JunosJuniper21.4-r3-s4 (including)21.4-r3-s4 (including)
JunosJuniper21.4-r3-s5 (including)21.4-r3-s5 (including)
JunosJuniper21.4-r3-s6 (including)21.4-r3-s6 (including)
JunosJuniper21.4-r3-s7 (including)21.4-r3-s7 (including)
JunosJuniper21.4-r3-s8 (including)21.4-r3-s8 (including)
JunosJuniper21.4-r3-s9 (including)21.4-r3-s9 (including)
JunosJuniper22.2 (including)22.2 (including)
JunosJuniper22.4 (including)22.4 (including)
JunosJuniper22.4-r1 (including)22.4-r1 (including)
JunosJuniper22.4-r1-s1 (including)22.4-r1-s1 (including)
JunosJuniper22.4-r1-s2 (including)22.4-r1-s2 (including)
JunosJuniper22.4-r2 (including)22.4-r2 (including)
JunosJuniper22.4-r2-s1 (including)22.4-r2-s1 (including)
JunosJuniper22.4-r2-s2 (including)22.4-r2-s2 (including)
JunosJuniper22.4-r3 (including)22.4-r3 (including)
JunosJuniper22.4-r3-s1 (including)22.4-r3-s1 (including)
JunosJuniper22.4-r3-s2 (including)22.4-r3-s2 (including)
JunosJuniper22.4-r3-s3 (including)22.4-r3-s3 (including)
JunosJuniper22.4-r3-s4 (including)22.4-r3-s4 (including)
JunosJuniper22.4-r3-s5 (including)22.4-r3-s5 (including)
JunosJuniper22.4-r3-s6 (including)22.4-r3-s6 (including)
JunosJuniper22.4-r3-s7 (including)22.4-r3-s7 (including)
JunosJuniper23.2 (including)23.2 (including)
JunosJuniper23.2-r1 (including)23.2-r1 (including)
JunosJuniper23.2-r1-s1 (including)23.2-r1-s1 (including)
JunosJuniper23.2-r1-s2 (including)23.2-r1-s2 (including)
JunosJuniper23.2-r2 (including)23.2-r2 (including)
JunosJuniper23.2-r2-s1 (including)23.2-r2-s1 (including)
JunosJuniper23.2-r2-s2 (including)23.2-r2-s2 (including)
JunosJuniper23.2-r2-s3 (including)23.2-r2-s3 (including)
JunosJuniper23.2-r2-s4 (including)23.2-r2-s4 (including)
JunosJuniper23.4 (including)23.4 (including)
JunosJuniper23.4-r1 (including)23.4-r1 (including)
JunosJuniper23.4-r1-s1 (including)23.4-r1-s1 (including)
JunosJuniper23.4-r1-s2 (including)23.4-r1-s2 (including)
JunosJuniper23.4-r2 (including)23.4-r2 (including)
JunosJuniper23.4-r2-s1 (including)23.4-r2-s1 (including)
JunosJuniper23.4-r2-s2 (including)23.4-r2-s2 (including)
JunosJuniper23.4-r2-s3 (including)23.4-r2-s3 (including)
JunosJuniper23.4-r2-s4 (including)23.4-r2-s4 (including)
JunosJuniper23.4-r2-s5 (including)23.4-r2-s5 (including)
JunosJuniper24.2 (including)24.2 (including)
JunosJuniper24.2-r1 (including)24.2-r1 (including)
JunosJuniper24.2-r1-s1 (including)24.2-r1-s1 (including)
JunosJuniper24.2-r1-s2 (including)24.2-r1-s2 (including)
JunosJuniper24.2-r2 (including)24.2-r2 (including)
JunosJuniper24.2-r2-s1 (including)24.2-r2-s1 (including)
JunosJuniper24.4 (including)24.4 (including)
JunosJuniper24.4-r1 (including)24.4-r1 (including)
JunosJuniper24.4-r1-s2 (including)24.4-r1-s2 (including)
JunosJuniper24.4-r1-s3 (including)24.4-r1-s3 (including)
JunosJuniper25.2 (including)25.2 (including)
JunosJuniper25.2-r1 (including)25.2-r1 (including)
JunosJuniper25.2-r2 (including)25.2-r2 (including)
Junos_os_evolvedJuniper*21.4 (excluding)
Junos_os_evolvedJuniper21.4 (including)21.4 (including)
Junos_os_evolvedJuniper21.4-r1 (including)21.4-r1 (including)
Junos_os_evolvedJuniper21.4-r1-s1 (including)21.4-r1-s1 (including)
Junos_os_evolvedJuniper21.4-r1-s2 (including)21.4-r1-s2 (including)
Junos_os_evolvedJuniper21.4-r2 (including)21.4-r2 (including)
Junos_os_evolvedJuniper21.4-r2-s1 (including)21.4-r2-s1 (including)
Junos_os_evolvedJuniper21.4-r2-s2 (including)21.4-r2-s2 (including)
Junos_os_evolvedJuniper21.4-r3 (including)21.4-r3 (including)
Junos_os_evolvedJuniper21.4-r3-s1 (including)21.4-r3-s1 (including)
Junos_os_evolvedJuniper21.4-r3-s10 (including)21.4-r3-s10 (including)
Junos_os_evolvedJuniper21.4-r3-s11 (including)21.4-r3-s11 (including)
Junos_os_evolvedJuniper21.4-r3-s2 (including)21.4-r3-s2 (including)
Junos_os_evolvedJuniper21.4-r3-s3 (including)21.4-r3-s3 (including)
Junos_os_evolvedJuniper21.4-r3-s4 (including)21.4-r3-s4 (including)
Junos_os_evolvedJuniper21.4-r3-s5 (including)21.4-r3-s5 (including)
Junos_os_evolvedJuniper21.4-r3-s6 (including)21.4-r3-s6 (including)
Junos_os_evolvedJuniper21.4-r3-s7 (including)21.4-r3-s7 (including)
Junos_os_evolvedJuniper21.4-r3-s8 (including)21.4-r3-s8 (including)
Junos_os_evolvedJuniper21.4-r3-s9 (including)21.4-r3-s9 (including)
Junos_os_evolvedJuniper22.2 (including)22.2 (including)
Junos_os_evolvedJuniper22.4 (including)22.4 (including)
Junos_os_evolvedJuniper22.4-r1 (including)22.4-r1 (including)
Junos_os_evolvedJuniper22.4-r1-s1 (including)22.4-r1-s1 (including)
Junos_os_evolvedJuniper22.4-r1-s2 (including)22.4-r1-s2 (including)
Junos_os_evolvedJuniper22.4-r2 (including)22.4-r2 (including)
Junos_os_evolvedJuniper22.4-r2-s1 (including)22.4-r2-s1 (including)
Junos_os_evolvedJuniper22.4-r2-s2 (including)22.4-r2-s2 (including)
Junos_os_evolvedJuniper22.4-r3 (including)22.4-r3 (including)
Junos_os_evolvedJuniper22.4-r3-s1 (including)22.4-r3-s1 (including)
Junos_os_evolvedJuniper22.4-r3-s2 (including)22.4-r3-s2 (including)
Junos_os_evolvedJuniper22.4-r3-s3 (including)22.4-r3-s3 (including)
Junos_os_evolvedJuniper22.4-r3-s4 (including)22.4-r3-s4 (including)
Junos_os_evolvedJuniper22.4-r3-s5 (including)22.4-r3-s5 (including)
Junos_os_evolvedJuniper22.4-r3-s6 (including)22.4-r3-s6 (including)
Junos_os_evolvedJuniper22.4-r3-s7 (including)22.4-r3-s7 (including)
Junos_os_evolvedJuniper23.2 (including)23.2 (including)
Junos_os_evolvedJuniper23.2-r1 (including)23.2-r1 (including)
Junos_os_evolvedJuniper23.2-r1-s1 (including)23.2-r1-s1 (including)
Junos_os_evolvedJuniper23.2-r1-s2 (including)23.2-r1-s2 (including)
Junos_os_evolvedJuniper23.2-r2 (including)23.2-r2 (including)
Junos_os_evolvedJuniper23.2-r2-s1 (including)23.2-r2-s1 (including)
Junos_os_evolvedJuniper23.2-r2-s2 (including)23.2-r2-s2 (including)
Junos_os_evolvedJuniper23.2-r2-s3 (including)23.2-r2-s3 (including)
Junos_os_evolvedJuniper23.2-r2-s4 (including)23.2-r2-s4 (including)
Junos_os_evolvedJuniper23.4 (including)23.4 (including)
Junos_os_evolvedJuniper23.4-r1 (including)23.4-r1 (including)
Junos_os_evolvedJuniper23.4-r1-s1 (including)23.4-r1-s1 (including)
Junos_os_evolvedJuniper23.4-r1-s2 (including)23.4-r1-s2 (including)
Junos_os_evolvedJuniper23.4-r2 (including)23.4-r2 (including)
Junos_os_evolvedJuniper23.4-r2-s1 (including)23.4-r2-s1 (including)
Junos_os_evolvedJuniper23.4-r2-s2 (including)23.4-r2-s2 (including)
Junos_os_evolvedJuniper23.4-r2-s3 (including)23.4-r2-s3 (including)
Junos_os_evolvedJuniper23.4-r2-s4 (including)23.4-r2-s4 (including)
Junos_os_evolvedJuniper23.4-r2-s5 (including)23.4-r2-s5 (including)
Junos_os_evolvedJuniper24.2 (including)24.2 (including)
Junos_os_evolvedJuniper24.2-r1 (including)24.2-r1 (including)
Junos_os_evolvedJuniper24.2-r1-s2 (including)24.2-r1-s2 (including)
Junos_os_evolvedJuniper24.2-r2 (including)24.2-r2 (including)
Junos_os_evolvedJuniper24.2-r2-s1 (including)24.2-r2-s1 (including)
Junos_os_evolvedJuniper24.4 (including)24.4 (including)
Junos_os_evolvedJuniper24.4-r1 (including)24.4-r1 (including)
Junos_os_evolvedJuniper24.4-r1-s2 (including)24.4-r1-s2 (including)
Junos_os_evolvedJuniper24.4-r1-s3 (including)24.4-r1-s3 (including)
Junos_os_evolvedJuniper25.2 (including)25.2 (including)
Junos_os_evolvedJuniper25.2-r1 (including)25.2-r1 (including)
Junos_os_evolvedJuniper25.2-r2 (including)25.2-r2 (including)

Extended Description

The programmer may assume that certain events or conditions will never occur or do not need to be worried about, such as low memory conditions, lack of access to resources due to restrictive permissions, or misbehaving clients or components. However, attackers may intentionally trigger these unusual conditions, thus violating the programmer’s assumptions, possibly introducing instability, incorrect behavior, or a vulnerability. Note that this entry is not exclusively about the use of exceptions and exception handling, which are mechanisms for both checking and handling unusual or unexpected conditions.

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • Choose languages with features such as exception handling that force the programmer to anticipate unusual conditions that may generate exceptions. Custom exceptions may need to be developed to handle unusual business-logic conditions. Be careful not to pass sensitive exceptions back to the user (CWE-209, CWE-248).
  • Ensure that error messages only contain minimal details that are useful to the intended audience and no one else. The messages need to strike the balance between being too cryptic (which can confuse users) or being too detailed (which may reveal more than intended). The messages should not reveal the methods that were used to determine the error. Attackers can use detailed information to refine or optimize their original attack, thereby increasing their chances of success.
  • If errors must be captured in some detail, record them in log messages, but consider what could occur if the log messages can be viewed by attackers. Highly sensitive information such as passwords should never be saved to log files.
  • Avoid inconsistent messaging that might accidentally tip off an attacker about internal state, such as whether a user account exists or not.
  • Exposing additional information to a potential attacker in the context of an exceptional condition can help the attacker determine what attack vectors are most likely to succeed beyond DoS.
  • Assume all input is malicious. Use an “accept known good” input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
  • When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, “boat” may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as “red” or “blue.”
  • Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code’s environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.

References