Juniper Junos OS UI Improper ACL allows view users to shut interface – DoS
CVE-2025-52963 Published on July 11, 2025
Junos OS: A low-privileged user can disable an interface
An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service.
Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface.
This issue affects Junos OS:
* All versions before 21.2R3-S9,
* from 21.4 before 21.4R3-S11,
* from 22.2 before 22.2R3-S7,
* from 22.4 before 22.4R3-S7,
* from 23.2 before 23.2R2-S4,
* from 23.4 before 23.4R2-S5,
* from 24.2 before 24.2R2-S1,
* from 24.4 before 24.4R1-S3, 24.4R2.
Vulnerability Analysis
CVE-2025-52963 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2025-52963 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2025-52963
Want to know whenever a new CVE is published for Juniper Networks Junos? stack.watch will email you.
Affected Versions
Juniper Networks Junos OS:- Before 21.2R3-S9 is affected.
- Version 21.4 and below 21.4R3-S11 is affected.
- Version 22.2 and below 22.2R3-S7 is affected.
- Version 22.4 and below 22.4R3-S7 is affected.
- Version 23.2 and below 23.2R2-S4 is affected.
- Version 23.4 and below 23.4R2-S5 is affected.
- Version 24.2 and below 24.2R2-S1 is affected.
- Version 24.4 and below 24.4R1-S3, 24.4R2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.