CVE-2025-52963
EUVD-2025-2115111.07.2025, 15:15
An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service. Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S11, * from 22.2 before 22.2R3-S7, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2-S1, * from 24.4 before 24.4R1-S3, 24.4R2.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos | 𝑥 < 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2:r1 |
| juniper | junos | 21.2:r1-s1 |
| juniper | junos | 21.2:r1-s2 |
| juniper | junos | 21.2:r2 |
| juniper | junos | 21.2:r2-s1 |
| juniper | junos | 21.2:r2-s2 |
| juniper | junos | 21.2:r3 |
| juniper | junos | 21.2:r3-s1 |
| juniper | junos | 21.2:r3-s2 |
| juniper | junos | 21.2:r3-s3 |
| juniper | junos | 21.2:r3-s4 |
| juniper | junos | 21.2:r3-s5 |
| juniper | junos | 21.2:r3-s6 |
| juniper | junos | 21.2:r3-s7 |
| juniper | junos | 21.2:r3-s8 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4:r1 |
| juniper | junos | 21.4:r1-s1 |
| juniper | junos | 21.4:r1-s2 |
| juniper | junos | 21.4:r2 |
| juniper | junos | 21.4:r2-s1 |
| juniper | junos | 21.4:r2-s2 |
| juniper | junos | 21.4:r3 |
| juniper | junos | 21.4:r3-s1 |
| juniper | junos | 21.4:r3-s10 |
| juniper | junos | 21.4:r3-s2 |
| juniper | junos | 21.4:r3-s3 |
| juniper | junos | 21.4:r3-s4 |
| juniper | junos | 21.4:r3-s5 |
| juniper | junos | 21.4:r3-s6 |
| juniper | junos | 21.4:r3-s7 |
| juniper | junos | 21.4:r3-s8 |
| juniper | junos | 21.4:r3-s9 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2:r1 |
| juniper | junos | 22.2:r1-s1 |
| juniper | junos | 22.2:r1-s2 |
| juniper | junos | 22.2:r2 |
| juniper | junos | 22.2:r2-s1 |
| juniper | junos | 22.2:r2-s2 |
| juniper | junos | 22.2:r3 |
| juniper | junos | 22.2:r3-s1 |
| juniper | junos | 22.2:r3-s2 |
| juniper | junos | 22.2:r3-s3 |
| juniper | junos | 22.2:r3-s4 |
| juniper | junos | 22.2:r3-s5 |
| juniper | junos | 22.2:r3-s6 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4:r1 |
| juniper | junos | 22.4:r1-s1 |
| juniper | junos | 22.4:r1-s2 |
| juniper | junos | 22.4:r2 |
| juniper | junos | 22.4:r2-s1 |
| juniper | junos | 22.4:r2-s2 |
| juniper | junos | 22.4:r3 |
| juniper | junos | 22.4:r3-s1 |
| juniper | junos | 22.4:r3-s2 |
| juniper | junos | 22.4:r3-s3 |
| juniper | junos | 22.4:r3-s4 |
| juniper | junos | 22.4:r3-s5 |
| juniper | junos | 22.4:r3-s6 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2:r1 |
| juniper | junos | 23.2:r1-s1 |
| juniper | junos | 23.2:r1-s2 |
| juniper | junos | 23.2:r2 |
| juniper | junos | 23.2:r2-s1 |
| juniper | junos | 23.2:r2-s2 |
| juniper | junos | 23.2:r2-s3 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4:r1 |
| juniper | junos | 23.4:r1-s1 |
| juniper | junos | 23.4:r1-s2 |
| juniper | junos | 23.4:r2 |
| juniper | junos | 23.4:r2-s1 |
| juniper | junos | 23.4:r2-s2 |
| juniper | junos | 23.4:r2-s3 |
| juniper | junos | 23.4:r2-s4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2:r1 |
| juniper | junos | 24.2:r1-s1 |
| juniper | junos | 24.2:r1-s2 |
| juniper | junos | 24.2:r2 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4:r1 |
| juniper | junos | 24.4:r1-s2 |
| juniper | junos | 24.4:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration