CVE-2025-30657

MEDIUM

Juniper Junos < 21.2 - Denial of Service

Title source: rule
STIX 2.1

Description

An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it's sent to SRRD it's encoded incorrectly which leads to a crash and momentary interruption of jflow processing until it automatically restarts. This issue does not affect traffic forwarding itself. This issue affects Junos OS:  * All versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R1-S2, 23.2R2. This issue does not affected Junos OS Evolved.

Scores

CVSS v3 5.3
EPSS 0.0039
EPSS Percentile 60.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-116
Status published
Products (4)
juniper/junos 21.2 (16 CPE variants)
juniper/junos 21.4 (17 CPE variants)
juniper/junos 22.2 (13 CPE variants)
juniper/junos 22.4 (4 CPE variants)
Published Apr 09, 2025
Tracked Since Feb 18, 2026