Rewterz
DarkCrystal RAT aka DCRat – Active IOCs
January 13, 2025
Rewterz
Multiple Dell Products Vulnerabilities
January 13, 2025

Multiple Juniper Networks Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2025-21598 CVSS:7.5

An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.

CVE-2025-21602 CVSS:7.1

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS).

CVE-2025-21600 CVSS:7.1

An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.

CVE-2025-21599 CVSS:8.7

A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.

CVE-2025-21596 CVSS:6.8

An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system.

CVE-2025-21593 CVSS:7.1

An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS).

CVE-2025-21592 CVSS:6.8

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.

Impact

  • Denial of Service
  • Gain Access
  • Information Disclosure

Indicators of Compromise

CVE

  • CVE-2025-21598

  • CVE-2025-21602

  • CVE-2025-21600

  • CVE-2025-21599

  • CVE-2025-21596

  • CVE-2025-21593

  • CVE-2025-21592

Affected Vendors

Juniper

Affected Products

  • Junos OS 21.2R3-S8 - 21.2R3-S9
  • Junos OS 21.4R3-S7 - 21.4R3-S9
  • Junos OS 22.2R3-S4 - 22.2R3-S5
  • Junos OS 22.3R3-S2 - 22.3R3-S4
  • Junos OS 22.4R3 - 22.4R3-S5
  • Junos OS 23.2R2 - 23.2R2-S2
  • Junos OS 23.4R1 - 23.4R2-S1
  • Junos OS Evolved 21.4R3-S7 EVO - 21.4R3-S9-EVO
  • Junos OS Evolved 22.2R3-S4-EVO - 22.2R3-S5-EVO
  • Junos OS Evolved 22.3R3-S2-EVO - 22.3R3-S4-EVO
  • Junos OS Evolved 22.4R3-EVO - 22.4R3-S5-EVO
  • Junos OS Evolved 23.2R2-EVO - 23.2R2-S2-EVO
  • Junos OS Evolved 23.4R1-EVO - 23.4R2-S1-EVO
  • Junos OS SRX Series 21.4R3-S8
  • Junos OS SRX Series 22.2 before 22.2R3-S5
  • Junos OS SRX Series 22.3 before 22.3R3-S3
  • Junos OS SRX Series 22.4 before 22.4R3-S2
  • Junos OS SRX Series 23.2 before 23.2R2-S1
  • Junos OS SRX Series 23.4 before 23.4R2

Remediation

Refer to Juniper Networks Security Advisory for patch, upgrade, or suggested workaround information.

CVE-2025-21598

CVE-2025-21602

CVE-2025-21600

CVE-2025-21599

CVE-2025-21596

CVE-2025-21593

CVE-2025-21592