A Use of Incorrect Byte Ordering 
vulnerability 
in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.
This issue affects eBGP and iBGP over IPv4 and IPv6.
This issue affects:
Junos OS:
  *  22.1 versions from 22.1R1 before 22.2R3-S4,
  *  22.3 versions before 22.3R3-S3,
  *  22.4 versions before 22.4R3-S2,
  *  23.2 versions before 23.2R2,
  *  23.4 versions before 23.4R2.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://supportportal.juniper.net/JSA100084 |     | 
History
                    Tue, 15 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | 
Fri, 11 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart. This issue affects eBGP and iBGP over IPv4 and IPv6. This issue affects: Junos OS: * 22.1 versions from 22.1R1 before 22.2R3-S4, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S2, * 23.2 versions before 23.2R2, * 23.4 versions before 23.4R2. | |
| Title | Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message | |
| Weaknesses | CWE-198 | |
| References |  | |
| Metrics | cvssV3_1 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: juniper
Published: 2025-07-11T15:08:15.638Z
Updated: 2025-07-15T19:55:48.095Z
Reserved: 2025-06-23T18:23:44.545Z
Link: CVE-2025-52980
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-11T16:05:23.012Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-07-11T16:15:24.647
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-52980
 Redhat
                        Redhat
                    No data.