CVE-2025-52988

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root.

When a user provides specifically crafted arguments to the 'request system logout' command, these will be executed as root on the shell, which can completely compromise the device.
This issue affects:

Junos OS:



  *  all versions before 21.2R3-S9,
  *  21.4 versions before 21.4R3-S8,
  *  22.2 versions before 22.2R3-S6,
  *  22.3 versions before 22.3R3-S3,
  *  22.4 versions before 22.4R3-S6,
  *  23.2 versions before 23.2R2-S1,
  *  23.4 versions before 23.4R1-S2, 23.4R2;




Junos OS Evolved:



  *  all versions before 22.4R3-S6-EVO,
  *  23.2-EVO versions before 23.2R2-S1-EVO,
  *  23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
juniperCNA
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---