8.5

CVE-2025-52954

Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system

A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise.

Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system. 

This issue affects Junos OS Evolved: 



  *  All versions before 22.2R3-S7-EVO, 
  *  from 22.4 before 22.4R3-S7-EVO, 
  *  from 23.2 before 23.2R2-S4-EVO, 
  *  from 23.4 before 23.4R2-S5-EVO, 
  *  from 24.2 before 24.2R2-S1-EVO
  *  from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Os Evolved Version < 22.2
JuniperJunos Os Evolved Version22.2 Update-
JuniperJunos Os Evolved Version22.2 Updater1
JuniperJunos Os Evolved Version22.2 Updater1-s1
JuniperJunos Os Evolved Version22.2 Updater1-s2
JuniperJunos Os Evolved Version22.2 Updater2
JuniperJunos Os Evolved Version22.2 Updater2-s1
JuniperJunos Os Evolved Version22.2 Updater2-s2
JuniperJunos Os Evolved Version22.2 Updater3
JuniperJunos Os Evolved Version22.2 Updater3-s1
JuniperJunos Os Evolved Version22.2 Updater3-s2
JuniperJunos Os Evolved Version22.2 Updater3-s3
JuniperJunos Os Evolved Version22.2 Updater3-s4
JuniperJunos Os Evolved Version22.2 Updater3-s5
JuniperJunos Os Evolved Version22.2 Updater3-s6
JuniperJunos Os Evolved Version22.4 Update-
JuniperJunos Os Evolved Version22.4 Updater1
JuniperJunos Os Evolved Version22.4 Updater1-s1
JuniperJunos Os Evolved Version22.4 Updater1-s2
JuniperJunos Os Evolved Version22.4 Updater2
JuniperJunos Os Evolved Version22.4 Updater2-s1
JuniperJunos Os Evolved Version22.4 Updater2-s2
JuniperJunos Os Evolved Version22.4 Updater3
JuniperJunos Os Evolved Version22.4 Updater3-s1
JuniperJunos Os Evolved Version22.4 Updater3-s2
JuniperJunos Os Evolved Version22.4 Updater3-s3
JuniperJunos Os Evolved Version22.4 Updater3-s4
JuniperJunos Os Evolved Version22.4 Updater3-s5
JuniperJunos Os Evolved Version22.4 Updater3-s6
JuniperJunos Os Evolved Version23.2 Update-
JuniperJunos Os Evolved Version23.2 Updater1
JuniperJunos Os Evolved Version23.2 Updater1-s1
JuniperJunos Os Evolved Version23.2 Updater1-s2
JuniperJunos Os Evolved Version23.2 Updater2
JuniperJunos Os Evolved Version23.2 Updater2-s1
JuniperJunos Os Evolved Version23.2 Updater2-s2
JuniperJunos Os Evolved Version23.2 Updater2-s3
JuniperJunos Os Evolved Version23.4 Update-
JuniperJunos Os Evolved Version23.4 Updater1
JuniperJunos Os Evolved Version23.4 Updater1-s1
JuniperJunos Os Evolved Version23.4 Updater1-s2
JuniperJunos Os Evolved Version23.4 Updater2
JuniperJunos Os Evolved Version23.4 Updater2-s1
JuniperJunos Os Evolved Version23.4 Updater2-s2
JuniperJunos Os Evolved Version23.4 Updater2-s3
JuniperJunos Os Evolved Version23.4 Updater2-s4
JuniperJunos Os Evolved Version24.2 Update-
JuniperJunos Os Evolved Version24.2 Updater1
JuniperJunos Os Evolved Version24.2 Updater1-s2
JuniperJunos Os Evolved Version24.2 Updater2
JuniperJunos Os Evolved Version24.4 Update-
JuniperJunos Os Evolved Version24.4 Updater1
JuniperJunos Os Evolved Version24.4 Updater2
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.205
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 8.5 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
sirt@juniper.net 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.