A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition.
This issue affects Junos OS Evolved PTX Series:
* All versions before 22.4R3-S8-EVO,
* from 23.2 before 23.2R2-S5-EVO,
* from 23.4 before 23.4R2-EVO,
* from 24.2 before 24.2R2-EVO,
* from 24.4 before 24.4R2-EVO.
This issue affects Junos OS Evolved on QFX5000 Series:
* 22.2-EVO version before 22.2R3-S7-EVO,
* 22.4-EVO version before 22.4R3-S7-EVO,
* 23.2-EVO versions before 23.2R2-S4-EVO,
* 23.4-EVO versions before 23.4R2-S5-EVO,
* 24.2-EVO versions before 24.2R2-S1-EVO,
* 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.
This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.
References
| Link | Resource |
|---|---|
| https://kb.juniper.net/JSA103159 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
28 Apr 2026, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://kb.juniper.net/JSA103159 - Vendor Advisory | |
| CPE | cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s4:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5241:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s7:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10002-36qdd:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5230-64cd:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx12008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5700:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5240:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s6:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:* |
|
| First Time |
Juniper qfx5700
Juniper ptx12008 Juniper qfx5120 Juniper Juniper qfx5210 Juniper ptx10004 Juniper junos Os Evolved Juniper ptx10016 Juniper qfx5241 Juniper ptx10001-36mr Juniper qfx5240 Juniper qfx5200 Juniper qfx5230-64cd Juniper ptx10003 Juniper ptx10002-36qdd Juniper qfx5220 Juniper ptx10008 Juniper qfx5130 Juniper qfx5110 |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-28 20:18
NVD link : CVE-2025-59969
Mitre link : CVE-2025-59969
CVE.ORG link : CVE-2025-59969
JSON object : View
Products Affected
juniper
- ptx12008
- qfx5130
- ptx10002-36qdd
- qfx5220
- qfx5230-64cd
- qfx5240
- qfx5200
- ptx10016
- qfx5110
- ptx10003
- qfx5700
- ptx10001-36mr
- qfx5120
- qfx5210
- ptx10008
- junos_os_evolved
- ptx10004
- qfx5241
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
