CVE-2025-52954

7.8 HIGH

📋 TL;DR

A Missing Authorization vulnerability in Juniper Networks Junos OS Evolved allows local low-privileged users to gain root privileges by sending packets over the internal VRF. This enables arbitrary command execution and configuration modification, leading to complete system compromise. Affected users are those running vulnerable Junos OS Evolved versions.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions before 22.2R3-S7-EVO, from 22.4 before 22.4R3-S7-EVO, from 23.2 before 23.2R2-S4-EVO, from 23.4 before 23.4R2-S5-EVO, from 24.2 before 24.2R2-S1-EVO, from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the device and ability to send packets over internal VRF.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover by any local low-privileged user, enabling persistent backdoors, data theft, and network pivoting.

🟠

Likely Case

Local privilege escalation leading to unauthorized configuration changes, service disruption, and credential harvesting.

🟢

If Mitigated

Limited impact if strict access controls prevent local user access to affected systems.

🌐 Internet-Facing: LOW - Requires local access to the device, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any local user (including compromised accounts) can gain root privileges and compromise the device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but appears straightforward based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.2R3-S7-EVO, 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S2-EVO or later

Vendor Advisory: https://supportportal.juniper.net/JSA100060

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate patch from Juniper support portal. 3. Apply patch following Juniper upgrade procedures. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user accounts and implement strict access controls to prevent unauthorized local access.

configure
set system login user [username] class [restricted-class]
commit

Monitor VRF activity

all

Implement logging and monitoring for internal VRF packet activity.

set system syslog file vrf-monitor any any
set system syslog host [monitoring-host] any any
commit

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Enforce least privilege access controls and monitor for suspicious local user activity

🔍 How to Verify

Check if Vulnerable:

Run 'show version' and compare against affected version ranges listed in the advisory.

Check Version:

show version

Verify Fix Applied:

After patching, run 'show version' to confirm version is patched and test that low-privileged users cannot execute privileged commands.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized configuration changes
  • Suspicious VRF-related packet activity

Network Indicators:

  • Unusual traffic patterns from network devices
  • Unauthorized configuration changes to routing tables

SIEM Query:

source="juniper-firewall" AND (event_type="privilege_escalation" OR config_change="unauthorized")

🔗 References

📤 Share & Export