{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-59964","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2025-09-23T18:19:06.955Z","datePublished":"2025-10-09T15:46:25.285Z","dateUpdated":"2025-10-09T19:00:04.954Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["SRX4700"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"24.4R1-S3, 24.4R2","status":"affected","version":"24.4","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Below is the configuration to check if sampling is enabled. <br><br></span><tt><span style=\"background-color: rgb(255, 255, 255);\">&nbsp; [ forwarding-options sampling ]</span></tt><br>"}],"value":"Below is the configuration to check if sampling is enabled. \n\n  [ forwarding-options sampling ]"}],"datePublic":"2025-10-08T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">A Use of Uninitialized Resource vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX4700&nbsp;<span style=\"background-color: rgb(251, 251, 251);\">devices allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).</span></span><br><br><span style=\"background-color: rgb(255, 255, 255);\">When forwarding-options sampling&nbsp;</span>is enabled, receipt&nbsp;of any traffic destined to the Routing Engine (RE) by the PFE line card&nbsp;<span style=\"background-color: rgb(251, 251, 251);\">leads to an FPC crash and restart, resulting in a Denial of Service (DoS). <br><br>Continued receipt and processing of any traffic leading to the RE by the PFE line card will create a sustained Denial of Service (DoS) condition to the PFE line card.<span style=\"background-color: rgb(251, 251, 251);\"><br></span><p></p></span><p>This issue affects&nbsp;Junos OS on SRX4700:&nbsp;</p><p></p><ul><li>from 24.4 before 24.4R1-S3, 24.4R2</li></ul>This issue affects IPv4 and IPv6.<br><p></p>"}],"value":"A Use of Uninitialized Resource vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX4700 devices allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nWhen forwarding-options sampling is enabled, receipt of any traffic destined to the Routing Engine (RE) by the PFE line card leads to an FPC crash and restart, resulting in a Denial of Service (DoS). \n\nContinued receipt and processing of any traffic leading to the RE by the PFE line card will create a sustained Denial of Service (DoS) condition to the PFE line card.\n\n\nThis issue affects Junos OS on SRX4700: \n\n\n\n  *  from 24.4 before 24.4R1-S3, 24.4R2\n\n\nThis issue affects IPv4 and IPv6."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"YES","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"GREEN","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"CONCENTRATED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/V:C/RE:M/U:Green","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-908","description":"CWE-908: Use of Uninitialized Resource","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2025-10-09T15:46:25.285Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA103153"},{"tags":["technical-description"],"url":"https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/sampling-edit-forwarding-options.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: <br><br>Junos OS: 24.4R1-S3, 24.4R2,&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">25.2R1 and all subsequent releases.</span><br>"}],"value":"The following software releases have been updated to resolve this specific issue: \n\nJunos OS: 24.4R1-S3, 24.4R2, 25.2R1 and all subsequent releases."}],"source":{"advisory":"JSA103153","defect":["1867583"],"discovery":"USER"},"title":"Junos OS: SRX4700: When forwarding-options sampling is enabled any traffic destined to the RE will cause the forwarding line card to crash and restart","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"To workaround this issue an administrator must block all traffic from the PFE line card to the Routing Engine (RE) until a fix can be taken.<br>Even while under a persistent DoS attack the RE will continue to be accessible to administrators through non-PFE line card interfaces E.g. Console, FXP0.<br>"}],"value":"To workaround this issue an administrator must block all traffic from the PFE line card to the Routing Engine (RE) until a fix can be taken.\nEven while under a persistent DoS attack the RE will continue to be accessible to administrators through non-PFE line card interfaces E.g. Console, FXP0."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-09T18:59:53.970460Z","id":"CVE-2025-59964","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-09T19:00:04.954Z"}}]}}