An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS). 
Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability.
This issue affects Junos OS:
  *  All versions before 21.2R3-S9,
  *  from 21.4 before 21.4R3-S11,
  *  from 22.2 before 22.2R3-S7,
  *  from 22.4 before 22.4R3-S7,
  *  from 23.2 before 23.2R2-S4,
  *  from 23.4 before 23.4R2-S4,
  *  from 24.2 before 24.2R2,
  *  from 24.4 before 24.4R1-S3, 24.4R2
Junos OS Evolved:
  *  All versions before 22.2R3-S7-EVO,
  *  from 22.4-EVO before 22.4R3-S7-EVO,
  *  from 23.2-EVO before 23.2R2-S4-EVO,
  *  from 23.4-EVO before 23.4R2-S4-EVO,
  *  from 24.2-EVO before 24.2R2-EVO,
  *  from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Fri, 11 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 11 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S11, * from 22.2 before 22.2R3-S7, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S4, * from 24.2 before 24.2R2, * from 24.4 before 24.4R1-S3, 24.4R2 Junos OS Evolved: * All versions before 22.2R3-S7-EVO, * from 22.4-EVO before 22.4R3-S7-EVO, * from 23.2-EVO before 23.2R2-S4-EVO, * from 23.4-EVO before 23.4R2-S4-EVO, * from 24.2-EVO before 24.2R2-EVO, * from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO. | |
| Title | Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset | |
| Weaknesses | CWE-440 | |
| References |  | |
| Metrics | cvssV3_1 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: juniper
Published: 2025-07-11T15:04:55.140Z
Updated: 2025-07-11T20:11:26.659Z
Reserved: 2025-06-23T13:16:01.409Z
Link: CVE-2025-52953
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-11T20:11:22.486Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-11T15:15:26.100
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-52953
 Redhat
                        Redhat
                    No data.