{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-52989","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2025-06-23T18:23:44.546Z","datePublished":"2025-07-11T15:10:47.204Z","dateUpdated":"2025-09-24T08:03:12.314Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"22.2R3-S7","status":"affected","version":"0","versionType":"semver"},{"lessThan":"22.4R3-S7","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R2-S4","status":"affected","version":"23.2","versionType":"semver"},{"lessThan":"23.4R2-S4","status":"affected","version":"23.4","versionType":"semver"},{"lessThan":"24.2R2-S1","status":"affected","version":"24.2","versionType":"semver"},{"lessThan":"24.4R1-S2, 24.4R2","status":"affected","version":"24.4","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"22.4R3-S7-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"23.2R2-S4-EVO","status":"affected","version":"23.2-EVO","versionType":"semver"},{"lessThan":"23.4R2-S5-EVO","status":"affected","version":"23.4-EVO","versionType":"semver"},{"lessThan":"24.2R2-S1-EVO","status":"affected","version":"24.2-EVO","versionType":"semver"},{"lessThan":"24.4R2-EVO","status":"affected","version":"24.4-EVO","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Vincent Szurma (vszurma) – Independent IT and Security Consultant"}],"datePublic":"2025-07-09T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Improper Neutralization of Delimiters vulnerability in the UI of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to modify the system configuration.<br><p><br></p><p>A user with limited configuration and commit permissions, using a specifically crafted annotate configuration command,&nbsp;can change any part of the device configuration.</p><p><br></p><p>This issue affects:</p><p>&nbsp;Junos OS:&nbsp;</p><p></p><ul><li>all versions before 22.2R3-S7,</li><li>22.4 versions before 22.4R3-S7,</li><li>23.2 versions before 23.2R2-S4,</li><li>23.4 versions before 23.4R2-S4,</li><li>24.2 versions before 24.2R2-S1,</li><li>24.4 versions before 24.4R1-S2, 24.4R2;</li></ul><p></p><p>Junos OS Evolved:</p><p></p><ul><li>all versions before 22.4R3-S7-EVO,</li><li>23.2-EVO versions before 23.2R2-S4-EVO,</li><li><span style=\"background-color: rgb(255, 255, 255);\">23.4-EVO versions before 23.4R2-S5-EVO,&nbsp;</span></li><li><span style=\"background-color: rgb(255, 255, 255);\">24.2-EVO versions before 24.2R2-S1-EVO</span>\n\n<br></li><li>24.4-EVO versions before 24.4R2-EVO.</li></ul><p><br></p>"}],"value":"An Improper Neutralization of Delimiters vulnerability in the UI of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to modify the system configuration.\n\n\n\nA user with limited configuration and commit permissions, using a specifically crafted annotate configuration command, can change any part of the device configuration.\n\n\n\n\nThis issue affects:\n\n Junos OS: \n\n\n\n  *  all versions before 22.2R3-S7,\n  *  22.4 versions before 22.4R3-S7,\n  *  23.2 versions before 23.2R2-S4,\n  *  23.4 versions before 23.4R2-S4,\n  *  24.2 versions before 24.2R2-S1,\n  *  24.4 versions before 24.4R1-S2, 24.4R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n  *  all versions before 22.4R3-S7-EVO,\n  *  23.2-EVO versions before 23.2R2-S4-EVO,\n  *  23.4-EVO versions before 23.4R2-S5-EVO, \n  *  24.2-EVO versions before 24.2R2-S1-EVO\n\n\n\n  *  24.4-EVO versions before 24.4R2-EVO."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":6.8,"baseSeverity":"MEDIUM","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/R:U/RE:M","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-140","description":"CWE-140 Improper Neutralization of Delimiters","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2025-09-24T08:03:12.314Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA100096"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue:<br>Junos OS Evolved: 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R2-EVO, 25.2R1-EVO;<br>Junos OS: 22.2R3-S7, 22.4R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2-S1, 24.4R1-S2, 24.4R2, 25.2R1, and all subsequent releases."}],"value":"The following software releases have been updated to resolve this specific issue:\nJunos OS Evolved: 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R2-EVO, 25.2R1-EVO;\nJunos OS: 22.2R3-S7, 22.4R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2-S1, 24.4R1-S2, 24.4R2, 25.2R1, and all subsequent releases."}],"source":{"advisory":"JSA100096","defect":["1860340"],"discovery":"EXTERNAL"},"title":"Junos OS and Junos OS Evolved: Annotate configuration command can be used to change the configuration","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>\n<p>To reduce the risk of exploitation use access lists or firewall filters to limit access to the CLI only from trusted hosts and administrators.</p>"}],"value":"There are no known workarounds for this issue.\n\n\nTo reduce the risk of exploitation use access lists or firewall filters to limit access to the CLI only from trusted hosts and administrators."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-11T16:04:20.634737Z","id":"CVE-2025-52989","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-15T19:55:03.872Z"}}]}}