A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device.
When static route points to a reject next hop and a gNMI query is processed for that static route, rpd crashes and restarts.
This issue affects:
Junos OS:   *  all versions before 21.2R3-S9,
  *  21.4 versions before 21.4R3-S10, 
  *  22.2 versions before 22.2R3-S6,
  *  22.4 versions before 22.4R3-S6,
  *  23.2 versions before 23.2R2-S3,
  *  23.4 versions before 23.4R2-S4,
  *  24.2 versions before 24.2R1-S2, 24.2R2;
Junos OS Evolved:
  *  all versions before 22.4R3-S7-EVO,
  *  23.2-EVO 
 versions before 23.2R2-S3-EVO,
  *  23.4-EVO versions before 23.4R2-S4-EVO,
  *  24.2-EVO versions before 24.2R2-EVO.
                
            References
                    | Link | Resource | 
|---|---|
| https://supportportal.juniper.net/JSA100090 | 
Configurations
                    No configuration.
History
                    15 Jul 2025, 13:14
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
11 Jul 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-11 16:15
Updated : 2025-07-15 13:14
NVD link : CVE-2025-52984
Mitre link : CVE-2025-52984
CVE.ORG link : CVE-2025-52984
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-476
                        
            NULL Pointer Dereference
