Juniper Junos rpd DoS via BGP Update Byte Ordering (22.1-23.4)
CVE-2025-52980 Published on July 11, 2025
Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message
A Use of Incorrect Byte Ordering
vulnerability
in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When a BGP update is received over an established BGP session which contains a specific, valid, optional, transitive path attribute, rpd will crash and restart.
This issue affects eBGP and iBGP over IPv4 and IPv6.
This issue affects:
Junos OS:
* 22.1 versions from 22.1R1 before 22.2R3-S4,
* 22.3 versions before 22.3R3-S3,
* 22.4 versions before 22.4R3-S2,
* 23.2 versions before 23.2R2,
* 23.4 versions before 23.4R2.
Vulnerability Analysis
CVE-2025-52980 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
Use of Incorrect Byte Ordering
The software receives input from an upstream component, but it does not account for byte ordering (e.g. big-endian and little-endian) when processing the input, causing an incorrect number or value to be used.
Products Associated with CVE-2025-52980
Want to know whenever a new CVE is published for Juniper Networks Junos? stack.watch will email you.
Affected Versions
Juniper Networks Junos OS:- Version 22.2 and below 22.2R3-S4 is affected.
- Version 22.3 and below 22.3R3-S3 is affected.
- Version 22.4 and below 22.4R3-S2 is affected.
- Version 23.2 and below 23.2R2 is affected.
- Version 23.4 and below 23.4R2 is affected.
- Before 22.1R1 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.