A Use of Incorrect Byte Ordering
vulnerability
in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.
This issue affects eBGP and iBGP over IPv4 and IPv6.
This issue affects:
Junos OS:
* 22.1 versions from 22.1R1 before 22.2R3-S4,
* 22.3 versions before 22.3R3-S3,
* 22.4 versions before 22.4R3-S2,
* 23.2 versions before 23.2R2,
* 23.4 versions before 23.4R2.
References
| Link | Resource |
|---|---|
| https://supportportal.juniper.net/JSA100084 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
23 Jan 2026, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:* |
|
| First Time |
Juniper srx340
Juniper srx320 Juniper junos Juniper srx300 Juniper Juniper srx380 Juniper srx345 |
|
| References | () https://supportportal.juniper.net/JSA100084 - Vendor Advisory |
15 Jul 2025, 13:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
11 Jul 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-11 16:15
Updated : 2026-01-23 19:37
NVD link : CVE-2025-52980
Mitre link : CVE-2025-52980
CVE.ORG link : CVE-2025-52980
JSON object : View
Products Affected
juniper
- srx340
- srx380
- srx320
- junos
- srx345
- srx300
CWE
CWE-198
Use of Incorrect Byte Ordering
