Description
A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device. When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts. This issue affects: Junos OS: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R1-S2, 24.2R2; Junos OS Evolved: * all versions before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S3-EVO, * 23.4-EVO versions before 23.4R2-S4-EVO, * 24.2-EVO versions before 24.2R2-EVO.
INFO
Published Date :
2025-07-11T15:09:37.765Z
Last Modified :
2025-07-15T19:55:22.722Z
Source :
juniper
AFFECTED PRODUCTS
The following products are affected by CVE-2025-52984 vulnerability.
| Vendors | Products |
|---|---|
| Juniper |
|
| Juniper Networks |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-52984.
| URL | Resource |
|---|---|
| https://supportportal.juniper.net/JSA100090 |
|