SB2025041470 - Improper encoding or escaping of output in Juniper Junos OS



SB2025041470 - Improper encoding or escaping of output in Juniper Junos OS

Published: April 14, 2025

Security Bulletin ID SB2025041470
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper encoding or escaping of output (CVE-ID: CVE-2025-30657)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The vulnerability exists due to improper encoding or escaping of output error in the Sampling Route Record Daemon (SRRD). A remote non-authenticated attacker can cause a Denial-of-Service (DoS).

When a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it's sent to SRRD it's encoded incorrectly which leads to a crash and momentary interruption of jflow processing until it automatically restarts.

This issue does not affect traffic forwarding itself.


Remediation

Install update from vendor's website.