{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-59967","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2025-09-23T18:19:06.955Z","datePublished":"2025-10-09T15:47:10.103Z","dateUpdated":"2025-10-09T16:11:02.135Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["evo-pfemand"],"platforms":["ACX7348","ACX7024","ACX7509","ACX7024X","ACX7100-32C","ACX7100-48L"],"product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"23.2R2-S4-EVO","status":"affected","version":"23.2R2-EVO","versionType":"semver"},{"lessThan":"23.4R2-EVO","status":"affected","version":"23.4R1-EVO","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Required Configuration for Exposure:<br></span><br><tt>&nbsp; [ Interface “interface” unit “unit”\nfamily inet\naddress “address” ]<br>or<br>&nbsp; [ Interface “interface” unit “unit”\nfamily inet6 address “address” ]<br></tt><p>This issue does not require a multicast configuration to be set on the device.<br></p><tt></tt>"}],"value":"Required Configuration for Exposure:\n\n  [ Interface “interface” unit “unit”\nfamily inet\naddress “address” ]\nor\n  [ Interface “interface” unit “unit”\nfamily inet6 address “address” ]\nThis issue does not require a multicast configuration to be set on the device."}],"datePublic":"2025-10-08T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">A NULL Pointer Dereference vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on <span style=\"background-color: rgb(255, 255, 255);\">ACX7024,&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">ACX7024X,</span>&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">ACX7100-32C,&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">ACX7100-48L,&nbsp;</span></span><span style=\"background-color: rgb(255, 255, 255);\">ACX7348,&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">ACX7509 devices a</span></span></span>llows an unauthenticated, adjacent attacker to cause a \n\n<span style=\"background-color: rgb(255, 255, 255);\">Denial-of-Service (DoS).</span></span><br><br>Whenever specific valid multicast traffic is received on any layer 3 interface the evo-pfemand process crashes and restarts.<br><br>Continued receipt of specific valid multicast traffic<span style=\"background-color: rgb(251, 251, 251);\">&nbsp;results in a sustained Denial of Service (DoS) attack. <br></span><p>This issue affects Junos OS Evolved on <span style=\"background-color: rgb(255, 255, 255);\">ACX7024, <span style=\"background-color: rgb(255, 255, 255);\">ACX7024X,</span>&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">ACX7100-32C, <span style=\"background-color: rgb(255, 255, 255);\">ACX7100-48L, </span></span><span style=\"background-color: rgb(255, 255, 255);\">ACX7348, <span style=\"background-color: rgb(255, 255, 255);\">ACX7509:&nbsp;</span></span></span></p><p></p><ul><li>from 23.2R2-EVO before 23.2R2-S4-EVO,&nbsp;</li><li>from 23.4R1-EVO before 23.4R2-EVO.</li></ul>This issue affects IPv4 and IPv6. <br><br>This issue does not affect  Junos OS Evolved <span style=\"background-color: rgb(255, 255, 255);\">ACX7024, <span style=\"background-color: rgb(255, 255, 255);\">ACX7024X,</span>&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">ACX7100-32C, <span style=\"background-color: rgb(255, 255, 255);\">ACX7100-48L, </span></span><span style=\"background-color: rgb(255, 255, 255);\">ACX7348, <span style=\"background-color: rgb(255, 255, 255);\">ACX7509&nbsp;</span></span></span>versions before 23.2R2-EVO.<span style=\"background-color: rgb(255, 255, 255);\"><br></span><p></p>"}],"value":"A NULL Pointer Dereference vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on ACX7024, ACX7024X, ACX7100-32C, ACX7100-48L, ACX7348, ACX7509 devices allows an unauthenticated, adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\nWhenever specific valid multicast traffic is received on any layer 3 interface the evo-pfemand process crashes and restarts.\n\nContinued receipt of specific valid multicast traffic results in a sustained Denial of Service (DoS) attack. \nThis issue affects Junos OS Evolved on ACX7024, ACX7024X, ACX7100-32C, ACX7100-48L, ACX7348, ACX7509: \n\n\n\n  *  from 23.2R2-EVO before 23.2R2-S4-EVO, \n  *  from 23.4R1-EVO before 23.4R2-EVO.\n\n\nThis issue affects IPv4 and IPv6. \n\nThis issue does not affect  Junos OS Evolved ACX7024, ACX7024X, ACX7100-32C, ACX7100-48L, ACX7348, ACX7509 versions before 23.2R2-EVO."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"YES","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.1,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"GREEN","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"CONCENTRATED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/V:C/RE:M/U:Green","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-476","description":"CWE-476: NULL Pointer Dereference","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2025-10-09T15:47:10.103Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA103156"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: <br><br>Junos OS Evolved: 23.2R2-S4-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases."}],"value":"The following software releases have been updated to resolve this specific issue: \n\nJunos OS Evolved: 23.2R2-S4-EVO, 23.4R2-EVO, 24.2R1-EVO, and all subsequent releases."}],"source":{"advisory":"JSA103156","defect":["1807221"],"discovery":"USER"},"title":"Junos OS Evolved: ACX7024, ACX7024X, ACX7100-32C,  ACX7100-48L, ACX7348, ACX7509: When specific valid multicast traffic is received on the L3 interface on a vulnerable device evo-pfemand crashes and restarts","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"There are no known workarounds for this issue.<br>To reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted hosts.<br>"}],"value":"There are no known workarounds for this issue.\nTo reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted hosts."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-09T16:10:54.290535Z","id":"CVE-2025-59967","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-09T16:11:02.135Z"}}]}}