A Reachable Assertion vulnerability in the Routing...
High severity
Unreviewed
Published
Jul 11, 2025
to the GitHub Advisory Database
•
Updated Jul 11, 2025
Description
Published by the National Vulnerability Database
Jul 11, 2025
Published to the GitHub Advisory Database
Jul 11, 2025
Last updated
Jul 11, 2025
A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
When the device receives a specific BGP UPDATE packet, the rpd crashes and restarts. Continuous receipt of this specific packet will cause a sustained DoS condition.
For the issue to occur, BGP multipath with "pause-computation-during-churn" must be configured on the device, and the attacker must send the paths via a BGP UPDATE from a established BGP peer.
This issue affects:
Junos OS:
Junos OS Evolved:
References