The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59959

CVE-2025-59959: Juniper Junos DoS Vulnerability

CVE-2025-59959 is a denial-of-service vulnerability in Juniper Junos OS and Junos OS Evolved affecting the routing protocol daemon. Local attackers can crash rpd using specific BGP route commands. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: May 15, 2026

CVE-2025-59959 Overview

CVE-2025-59959 is an Untrusted Pointer Dereference vulnerability [CWE-822] in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved. A local, authenticated attacker with low privileges can crash rpd by executing a specific BGP route inspection command. The crash occurs when show route < ( receive-protocol | advertising-protocol ) bgp > detail is run against routes containing certain attributes. The daemon restarts after the crash, producing a Denial-of-Service condition on the routing control plane. The equivalent show route ... extensive form is not affected.

Critical Impact

Any authenticated operator able to run BGP route inspection commands can repeatedly crash the routing protocol daemon, disrupting route processing on affected Juniper devices.

Affected Products

  • Juniper Junos OS: all versions before 22.4R3-S8, 23.2 before 23.2R2-S5, 23.4 before 23.4R2-S5, 24.2 before 24.2R2-S2, 24.4 before 24.4R2
  • Juniper Junos OS Evolved: all versions before 22.4R3-S8-EVO, 23.2 before 23.2R2-S5-EVO, 23.4 before 23.4R2-S6-EVO, 24.2 before 24.2R2-S2-EVO, 24.4 before 24.4R2-EVO
  • Routing platforms running rpd with BGP receive or advertise sessions configured

Discovery Timeline

  • 2026-01-15 - CVE-2025-59959 published to NVD
  • 2026-01-23 - Last updated in NVD database

Technical Details for CVE-2025-59959

Vulnerability Analysis

The flaw resides in the routing protocol daemon (rpd), the user-space process responsible for BGP, OSPF, IS-IS, and other routing protocol state on Junos platforms. When an operator issues show route receive-protocol bgp <neighbor> detail or show route advertising-protocol bgp <neighbor> detail, rpd formats per-route output and dereferences pointers associated with specific BGP path attributes. Under certain attribute combinations, an untrusted or unvalidated pointer is followed, leading to a process crash. Because rpd owns the routing information base, its restart forces re-establishment of routing adjacencies and reconvergence on the affected device.

Root Cause

The root cause is improper validation of an internal pointer during detailed BGP route formatting [CWE-822]. The detail output path reads attribute data without verifying that the referenced memory is the expected structure. The extensive variant uses a separate code path that performs the access safely, which is why it does not trigger the crash.

Attack Vector

Exploitation requires local CLI access with low privileges on the device. The attacker does not need root or configuration privileges, only the ability to execute show route commands. Triggering the bug also depends on at least one route in the relevant BGP session carrying the specific attribute combination, an externally influenced condition controlled by upstream BGP peers. Repeated execution produces a sustained DoS on the routing control plane.

No public proof-of-concept code is available, and exploitation requires authenticated CLI access. See the Juniper Security Advisory JSA103148 for vendor-confirmed technical details.

Detection Methods for CVE-2025-59959

Indicators of Compromise

  • Unexpected rpd core files in /var/crash/ or /var/tmp/ with timestamps correlating to operator show route activity
  • Syslog entries indicating RPD_TASK_REINIT, rpd[<pid>]: ... signal 11, or routing protocol session flaps following CLI command execution
  • Repeated BGP neighbor state transitions (Established → Idle → Established) without underlying network change

Detection Strategies

  • Correlate rpd process restarts in syslog with CLI command audit records from cli-commands accounting logs to identify the originating user and command
  • Alert on any rpd core file generation, as legitimate operations should not crash the daemon
  • Monitor TACACS+ or RADIUS command accounting for execution of show route receive-protocol bgp ... detail or show route advertising-protocol bgp ... detail followed by routing instability

Monitoring Recommendations

  • Forward Junos syslog and command accounting to a centralized SIEM or data lake for correlation across the routing fleet
  • Track BGP session uptime and route table size deltas to surface anomalous reconvergence events
  • Review request system core-dumps output regularly to capture crash artifacts before automatic cleanup

How to Mitigate CVE-2025-59959

Immediate Actions Required

  • Upgrade affected devices to a fixed Junos OS or Junos OS Evolved release listed in JSA103148
  • Restrict CLI access to trusted operators only and remove low-privilege accounts that do not require show route capability
  • Audit recent command accounting logs for execution of the vulnerable show route ... detail forms against BGP

Patch Information

Juniper has released fixed versions in Junos OS 22.4R3-S8, 23.2R2-S5, 23.4R2-S5, 24.2R2-S2, 24.4R2, and corresponding Junos OS Evolved builds 22.4R3-S8-EVO, 23.2R2-S5-EVO, 23.4R2-S6-EVO, 24.2R2-S2-EVO, and 24.4R2-EVO. Refer to the Juniper Security Advisory JSA103148 and the Juniper Support Portal for upgrade packages.

Workarounds

  • Use show route receive-protocol bgp <neighbor> extensive or show route advertising-protocol bgp <neighbor> extensive instead of the detail form, as the extensive variant is not affected
  • Apply Junos login classes to restrict the show route command from accounts that do not need it
  • Limit CLI access using allow-commands and deny-commands regular expressions in user class configuration
bash
# Example Junos login class restricting the vulnerable command form
set system login class restricted-ops permissions view
set system login class restricted-ops deny-commands "show route (receive-protocol|advertising-protocol) bgp .* detail"
set system login user operator1 class restricted-ops
commit

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechJuniper Junos

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-822
  • Technical References
  • Juniper Support Portal
  • Vendor Resources
  • Juniper Security Advisory JSA103148
  • Related CVEs
  • CVE-2025-52981: Juniper Junos SRX Series DoS Vulnerability

  • CVE-2025-21594: Juniper Junos DS-Lite NAT DoS Vulnerability

  • CVE-2025-30649: Juniper Junos DoS Vulnerability

  • CVE-2026-21918: Juniper Junos DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English