Missing Auth in Juniper Junos OS Evolved VRF, PrivEsc before 24.4R2
CVE-2025-52954 Published on July 11, 2025
Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system
A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise.
Any low-privileged user with the capability to send packets over the internal VRF can execute arbitrary Junos commands and modify the configuration, and thus compromise the system.
This issue affects Junos OS Evolved:
* All versions before 22.2R3-S7-EVO,
* from 22.4 before 22.4R3-S7-EVO,
* from 23.2 before 23.2R2-S4-EVO,
* from 23.4 before 23.4R2-S5-EVO,
* from 24.2 before 24.2R2-S1-EVO
* from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO.
Vulnerability Analysis
CVE-2025-52954 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2025-52954 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2025-52954
Want to know whenever a new CVE is published for Juniper Networks Junos Os Evolved? stack.watch will email you.
Affected Versions
Juniper Networks Junos OS Evolved:- Before 22.2R3-S7-EVO is affected.
- Version 22.4 and below 22.4R3-S7-EVO is affected.
- Version 23.2 and below 23.2R2-S4-EVO is affected.
- Version 23.4 and below 23.4R2-S5-EVO is affected.
- Version 24.2 and below 24.2R2-S1-EVO is affected.
- Version 24.4 and below 24.4R1-S2-EVO, 24.4R2-EVO is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.