CVE-2025-59959

EUVD-2026-2705
An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS).

When the command 'show route < ( receive-protocol | advertising-protocol ) bgp > detail' is executed, and at least one of the routes in the intended output has specific attributes, this will cause an rpd crash and restart.
'show route ... extensive' is not affected.




This issue affects:

Junos OS: 



  *  all versions before 22.4R3-S8,
  *  23.2 versions before 23.2R2-S5,
  *  23.4 versions before 23.4R2-S5,
  *  24.2 versions before 24.2R2-S2,
  *  24.4 versions before 24.4R2;




Junos OS Evolved:



  *  all versions before 22.4R3-S8-EVO, 
  *  23.2 versions before 23.2R2-S5-EVO,
  *  23.4 versions before 23.4R2-S6-EVO,
  *  24.2 versions before 24.2R2-S2-EVO,
  *  24.4 versions before 24.4R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
juniperCNA
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
juniperjunos
𝑥
< 22.4
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
juniperjunos
22.4:r3
juniperjunos
22.4:r3-s1
juniperjunos
22.4:r3-s2
juniperjunos
22.4:r3-s3
juniperjunos
22.4:r3-s4
juniperjunos
22.4:r3-s5
juniperjunos
22.4:r3-s6
juniperjunos
22.4:r3-s7
juniperjunos
23.2
juniperjunos
23.2:r1
juniperjunos
23.2:r1-s1
juniperjunos
23.2:r1-s2
juniperjunos
23.2:r2
juniperjunos
23.2:r2-s1
juniperjunos
23.2:r2-s2
juniperjunos
23.2:r2-s3
juniperjunos
23.2:r2-s4
juniperjunos
23.4
juniperjunos
23.4:r1
juniperjunos
23.4:r1-s1
juniperjunos
23.4:r1-s2
juniperjunos
23.4:r2
juniperjunos
23.4:r2-s1
juniperjunos
23.4:r2-s2
juniperjunos
23.4:r2-s3
juniperjunos
23.4:r2-s4
juniperjunos
24.2
juniperjunos
24.2:r1
juniperjunos
24.2:r1-s1
juniperjunos
24.2:r1-s2
juniperjunos
24.2:r2
juniperjunos
24.2:r2-s1
juniperjunos
24.4
juniperjunos
24.4:r1
juniperjunos
24.4:r1-s2
juniperjunos
24.4:r1-s3
juniperjunos_os_evolved
𝑥
< 22.4
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
22.4:r3
juniperjunos_os_evolved
22.4:r3-s1
juniperjunos_os_evolved
22.4:r3-s2
juniperjunos_os_evolved
22.4:r3-s3
juniperjunos_os_evolved
22.4:r3-s4
juniperjunos_os_evolved
22.4:r3-s5
juniperjunos_os_evolved
22.4:r3-s6
juniperjunos_os_evolved
22.4:r3-s7
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r1-s2
juniperjunos_os_evolved
23.2:r2
juniperjunos_os_evolved
23.2:r2-s1
juniperjunos_os_evolved
23.2:r2-s2
juniperjunos_os_evolved
23.2:r2-s3
juniperjunos_os_evolved
23.2:r2-s4
juniperjunos_os_evolved
23.4
juniperjunos_os_evolved
23.4:r1
juniperjunos_os_evolved
23.4:r1-s1
juniperjunos_os_evolved
23.4:r1-s2
juniperjunos_os_evolved
23.4:r2
juniperjunos_os_evolved
23.4:r2-s1
juniperjunos_os_evolved
23.4:r2-s2
juniperjunos_os_evolved
23.4:r2-s3
juniperjunos_os_evolved
23.4:r2-s4
juniperjunos_os_evolved
23.4:r2-s5
juniperjunos_os_evolved
24.2
juniperjunos_os_evolved
24.2:r1
juniperjunos_os_evolved
24.2:r1-s2
juniperjunos_os_evolved
24.2:r2
juniperjunos_os_evolved
24.2:r2-s1
juniperjunos_os_evolved
24.4
juniperjunos_os_evolved
24.4:r1
juniperjunos_os_evolved
24.4:r1-s2
juniperjunos_os_evolved
24.4:r1-s3
𝑥
= Vulnerable software versions