CVE-2025-52985

5.3 MEDIUM

📋 TL;DR

A Juniper Junos OS Evolved firewall filter vulnerability allows unauthenticated network attackers to bypass security restrictions when prefix lists with more than 10 entries are used. This affects firewall filters applied to management and loopback interfaces, potentially allowing unauthorized access to or from the local device. Only specific versions of Junos OS Evolved are affected.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: 23.2R2-S3-EVO before 23.2R2-S4-EVO, 23.4R2-S3-EVO before 23.4R2-S5-EVO, 24.2R2-EVO before 24.2R2-S1-EVO, 24.4-EVO before 24.4R1-S3-EVO and 24.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ✅ No
Notes: Only affects configurations where firewall filters with prefix lists containing more than 10 entries are applied to lo0 or re:mgmt interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall bypass for traffic to/from local device, allowing unauthorized access to management interfaces and potential device compromise.

🟠

Likely Case

Partial firewall bypass where certain traffic that should be blocked is allowed through, potentially exposing management services or allowing unauthorized communication.

🟢

If Mitigated

Limited impact if firewall filters are not applied to affected interfaces or if prefix lists contain 10 or fewer entries.

🌐 Internet-Facing: MEDIUM - If management interfaces are exposed to the internet, attackers could bypass firewall protections.
🏢 Internal Only: MEDIUM - Internal attackers could bypass firewall restrictions to access management interfaces or sensitive services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - No authentication required, attacker just needs to send traffic that should be blocked.

Exploitation requires specific firewall filter configurations with prefix lists exceeding 10 entries.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, 24.4R2-EVO

Vendor Advisory: https://supportportal.juniper.net/JSA100091

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate fixed version from Juniper support. 3. Install update following Juniper upgrade procedures. 4. Reboot device to apply changes.

🔧 Temporary Workarounds

Reduce prefix list entries

all

Modify firewall filters to use prefix lists with 10 or fewer entries on affected interfaces.

configure
edit firewall family inet prefix-list PL_NAME
delete entries beyond first 10
commit

Remove affected filters

all

Temporarily remove firewall filters from lo0 and re:mgmt interfaces until patched.

configure
delete interfaces lo0 unit 0 family inet filter
delete interfaces re:mgmt unit 0 family inet filter
commit

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected devices from untrusted networks.
  • Use additional firewall protections upstream to compensate for the bypass vulnerability.

🔍 How to Verify

Check if Vulnerable:

Check if firewall filters with prefix lists >10 entries are applied to lo0 or re:mgmt interfaces: 'show configuration interfaces lo0 | display set' and 'show configuration interfaces re:mgmt | display set'

Check Version:

show version | match Junos

Verify Fix Applied:

After patching, verify the fix by testing firewall filter functionality with prefix lists >10 entries on affected interfaces.

📡 Detection & Monitoring

Log Indicators:

  • Firewall filter match failures on lo0/re:mgmt interfaces
  • Unexpected traffic allowed through firewall filters

Network Indicators:

  • Traffic that should be blocked reaching management interfaces
  • Unauthorized access attempts to local device services

SIEM Query:

firewall bypass OR prefix-list AND (lo0 OR re:mgmt) AND Junos

🔗 References

📤 Share & Export