CVE-2025-59958

6.5 MEDIUM

📋 TL;DR

An unauthenticated network attacker can send specially crafted packets to PTX Series routers running vulnerable Junos OS Evolved versions, causing resource exhaustion on the Routing Engine and potential information disclosure. This affects PTX Series devices with output firewall filters containing 'reject' actions on WAN/revenue interfaces. Only Junos OS Evolved versions before 22.4R3-EVO and 23.2 versions before 23.2R2-EVO are vulnerable.

💻 Affected Systems

Products:
  • Juniper Networks PTX Series routers
Versions: All versions before 22.4R3-EVO and 23.2 versions before 23.2R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when output firewall filters with 'reject' actions are applied to WAN or revenue interfaces. Management (mgmt) and loopback (lo0) interfaces are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service on the Routing Engine, making the device unmanageable, plus disclosure of sensitive device information to attackers.

🟠

Likely Case

Degraded performance and intermittent management issues due to RE resource exhaustion, with potential information leakage about device configuration.

🟢

If Mitigated

Minimal impact if proper network segmentation and firewall rules prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending packets that match firewall filter terms with 'reject' actions. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4R3-EVO or later, 23.2R2-EVO or later

Vendor Advisory: https://supportportal.juniper.net/JSA103147

Restart Required: No

Instructions:

1. Download appropriate patch version from Juniper support portal. 2. Upload to device. 3. Install using 'request system software add' command. 4. Verify installation with 'show version'.

🔧 Temporary Workarounds

Remove or modify reject actions

all

Remove 'reject' actions from output firewall filters on WAN/revenue interfaces or replace with 'discard' actions

show configuration firewall family inet
delete firewall family inet filter FILTER_NAME term TERM_NAME then reject
set firewall family inet filter FILTER_NAME term TERM_NAME then discard

Apply input filters instead

all

Use input firewall filters instead of output filters where possible

set interfaces INTERFACE_NAME unit UNIT_NUMBER family inet filter input FILTER_NAME

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to vulnerable interfaces
  • Monitor RE CPU utilization and implement rate limiting on suspicious traffic

🔍 How to Verify

Check if Vulnerable:

Check version with 'show version' and verify if output firewall filters with 'reject' actions exist on WAN/revenue interfaces using 'show configuration firewall'

Check Version:

show version | match Junos

Verify Fix Applied:

Verify version is 22.4R3-EVO or later, or 23.2R2-EVO or later with 'show version', and confirm no output filters with 'reject' actions remain

📡 Detection & Monitoring

Log Indicators:

  • High RE CPU utilization alerts
  • Firewall reject log entries on output filters
  • Resource exhaustion warnings

Network Indicators:

  • Unexpected ICMP responses from routing engine
  • Increased traffic to management interfaces

SIEM Query:

source="juniper-firewall" action="reject" direction="output"

🔗 References

📤 Share & Export