CVE-2025-60004 (CNNVD-202510-1283)
中文标题:
Juniper Networks Junos OS和Juniper Networks Junos OS Evolved 代码问题漏洞
英文标题:
Junos OS and Junos OS Evolved: Specific BGP EVPN update message causes rpd crash
漏洞描述
中文描述:
Juniper Networks Junos OS和Juniper Networks Junos OS Evolved都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos OS是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。Juniper Networks Junos OS Evolved是Junos OS 的升级版系统。 Juniper Networks Junos OS和Juniper Networks Junos OS Evolved存在代码问题漏洞,该漏洞源于路由协议守护进程对异常条件检查不当,可能导致拒绝服务攻击。以下产品及版本受到影响:Juniper Networks Junos OS 23.4R2-S3版本至23.4R2-S5之前版本、24.2R2版本至24.2R2-S1之前版本和24.4R1-S3之前版本、24.4R2版本和Junos OS Evolved 23.4R2-S2-EVO版本至23.4R2-S5-EVO之前版本、24.2R2-EVO版本至24.2R2-S1-EVO之前版本和24.4R1-S3-EVO之前版本、24.4R2-EVO版本。
英文描述:
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS). When an affected system receives a specific BGP EVPN update message over an established BGP session, this causes an rpd crash and restart. A BGP EVPN configuration is not necessary to be vulnerable. If peers are not configured to send BGP EVPN updates to a vulnerable device, then this issue can't occur. This issue affects iBGP and eBGP, over IPv4 and IPv6. This issue affects: Junos OS: * 23.4 versions from 23.4R2-S3 before 23.4R2-S5, * 24.2 versions from 24.2R2 before 24.2R2-S1, * 24.4 versions before 24.4R1-S3, 24.4R2; Junos OS Evolved: * 23.4-EVO versions from 23.4R2-S2-EVO before 23.4R2-S5-EVO, * 24.2-EVO versions from 24.2R2-EVO before 24.2R2-S1-EVO, * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Juniper Networks | Junos OS | - | < 23.4R2-S5 | - |
cpe:2.3:a:juniper_networks:junos_os:*:*:*:*:*:*:*:*
|
| Juniper Networks | Junos OS Evolved | - | < 23.4R2-S5-EVO | - |
cpe:2.3:a:juniper_networks:junos_os_evolved:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.0 (cna)
HIGHCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/RE:M
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-60004 |
2025-11-11 15:23:32 | 2025-11-11 07:40:47 |
| NVD | nvd_CVE-2025-60004 |
2025-11-11 15:01:05 | 2025-11-11 07:48:34 |
| CNNVD | cnnvd_CNNVD-202510-1283 |
2025-11-11 15:12:28 | 2025-11-11 08:00:16 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202510-1283
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 6 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']