CVE-2025-52954

EUVD-2025-21161
A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise.

Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system. 

This issue affects Junos OS Evolved: 



  *  All versions before 22.2R3-S7-EVO, 
  *  from 22.4 before 22.4R3-S7-EVO, 
  *  from 23.2 before 23.2R2-S4-EVO, 
  *  from 23.4 before 23.4R2-S5-EVO, 
  *  from 24.2 before 24.2R2-S1-EVO
  *  from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
juniperCNA
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
juniperjunos_os_evolved
𝑥
< 22.2
juniperjunos_os_evolved
22.2
juniperjunos_os_evolved
22.2:r1
juniperjunos_os_evolved
22.2:r1-s1
juniperjunos_os_evolved
22.2:r1-s2
juniperjunos_os_evolved
22.2:r2
juniperjunos_os_evolved
22.2:r2-s1
juniperjunos_os_evolved
22.2:r2-s2
juniperjunos_os_evolved
22.2:r3
juniperjunos_os_evolved
22.2:r3-s1
juniperjunos_os_evolved
22.2:r3-s2
juniperjunos_os_evolved
22.2:r3-s3
juniperjunos_os_evolved
22.2:r3-s4
juniperjunos_os_evolved
22.2:r3-s5
juniperjunos_os_evolved
22.2:r3-s6
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
22.4:r3
juniperjunos_os_evolved
22.4:r3-s1
juniperjunos_os_evolved
22.4:r3-s2
juniperjunos_os_evolved
22.4:r3-s3
juniperjunos_os_evolved
22.4:r3-s4
juniperjunos_os_evolved
22.4:r3-s5
juniperjunos_os_evolved
22.4:r3-s6
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r1-s2
juniperjunos_os_evolved
23.2:r2
juniperjunos_os_evolved
23.2:r2-s1
juniperjunos_os_evolved
23.2:r2-s2
juniperjunos_os_evolved
23.2:r2-s3
juniperjunos_os_evolved
23.4
juniperjunos_os_evolved
23.4:r1
juniperjunos_os_evolved
23.4:r1-s1
juniperjunos_os_evolved
23.4:r1-s2
juniperjunos_os_evolved
23.4:r2
juniperjunos_os_evolved
23.4:r2-s1
juniperjunos_os_evolved
23.4:r2-s2
juniperjunos_os_evolved
23.4:r2-s3
juniperjunos_os_evolved
23.4:r2-s4
juniperjunos_os_evolved
24.2
juniperjunos_os_evolved
24.2:r1
juniperjunos_os_evolved
24.2:r1-s2
juniperjunos_os_evolved
24.2:r2
juniperjunos_os_evolved
24.4
juniperjunos_os_evolved
24.4:r1
juniperjunos_os_evolved
24.4:r2
𝑥
= Vulnerable software versions