CVE-2025-59969

| EUVD-2025-209396 HIGH
2026-04-09 juniper GHSA-qr7g-rj69-5948
7.1
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Analysis Generated
Apr 09, 2026 - 21:45 vuln.today
EUVD ID Assigned
Apr 09, 2026 - 21:45 euvd
EUVD-2025-209396
CVE Published
Apr 09, 2026 - 21:25 nvd
HIGH 7.1

Description

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition. This issue affects Junos OS Evolved PTX Series: * All versions before 22.4R3-S8-EVO, * from 23.2 before 23.2R2-S5-EVO, * from 23.4 before 23.4R2-EVO, * from 24.2 before 24.2R2-EVO, * from 24.4 before 24.4R2-EVO. This issue affects Junos OS Evolved on QFX5000 Series: * 22.2-EVO version before 22.2R3-S7-EVO, * 22.4-EVO version before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S5-EVO, * 24.2-EVO versions before 24.2R2-S1-EVO, * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO. This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.

Analysis

Unauthenticated buffer overflow in Juniper Networks Junos OS Evolved advanced forwarding toolkit (evo-aftmand/evo-pfemand) permits adjacent attackers to crash PTX Series and QFX5000 Series devices via crafted multicast packets. Exploitation triggers line card or device restart, sustaining denial of service under continuous attack. Affects multiple Junos OS Evolved release branches before patched versions. No public exploit identified at time of analysis. Attack requires adjacent network access but no authentication, making exploitation feasible in shared network segments.

Technical Context

Classic buffer overflow (CWE-120) in forwarding plane management daemons processes oversized multicast packets without bounds checking. Affects advanced forwarding toolkit components responsible for packet processing on PTX/QFX5000 hardware. CVSS 4.0 vector confirms unauthenticated adjacent vector (AV:A/PR:N) with high availability impact (VA:H) and subsequent system impact (SA:L).

Affected Products

Juniper Networks Junos OS Evolved on PTX Series: all versions before 22.4R3-S8-EVO, 23.2 before 23.2R2-S5-EVO, 23.4 before 23.4R2-EVO, 24.2 before 24.2R2-EVO, 24.4 before 24.4R2-EVO. QFX5000 Series: 22.2-EVO before 22.2R3-S7-EVO, 22.4-EVO before 22.4R3-S7-EVO, 23.2-EVO before 23.2R2-S4-EVO, 23.4-EVO before 23.4R2-S5-EVO, 24.2-EVO before 24.2R2-S1-EVO, 24.4-EVO before 24.4R1-S3-EVO/24.4R2-EVO. CPEs: cpe:2.3:a:juniper_networks:junos_os_evolved.

Remediation

Vendor-released patches: upgrade PTX Series to 22.4R3-S8-EVO, 23.2R2-S5-EVO, 23.4R2-EVO, 24.2R2-EVO, or 24.4R2-EVO depending on deployment branch. Upgrade QFX5000 Series to 22.2R3-S7-EVO, 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, or 24.4R2-EVO. QFX5000 versions before 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO confirmed unaffected. As workaround prior to patching, implement strict adjacent network access controls and multicast traffic filtering to limit attacker exposure. Complete remediation guidance and affected version matrices available in vendor security advisory: https://kb.juniper.net/JSA103159

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

CVE-2025-59969 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy