CVE-2025-59964

Forwarding · Forwarding Multiple Products

A high-severity vulnerability has been identified in the Packet Forwarding Engine of specific Juniper Networks devices.

Executive summary

A high-severity vulnerability has been identified in the Packet Forwarding Engine of specific Juniper Networks devices. An unauthenticated attacker on the network can exploit this flaw by sending specially crafted traffic, causing the device to crash and resulting in a complete Denial of Service (DoS). This can lead to a significant network outage, disrupting all services that rely on the affected device.

Vulnerability

The vulnerability is a "Use of Uninitialized Resource" within the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS running on SRX4700 devices. The PFE is responsible for processing and forwarding network traffic at high speed. When the device receives a specifically malformed network packet, the PFE attempts to access a memory resource that has not been properly initialized, leading to a critical error that causes the engine to crash. An unauthenticated, network-based attacker can trigger this condition remotely, requiring no prior access or credentials, leading to a Denial of Service as the device will cease to forward traffic.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. The primary business impact is the high likelihood of a service outage. Successful exploitation will render the SRX4700 device inoperable, disrupting all network traffic passing through it, including internet access, VPN connectivity, and access to internal resources. This can lead to significant business downtime, direct financial loss, reputational damage, and a potential breach of service-level agreements (SLAs). Given that the attack can be launched by any unauthenticated actor on the network, the risk to internet-facing devices is particularly high.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately. Due to the high severity and potential for service disruption, these patches should be prioritized for all affected SRX4700 devices. After patching, monitor the devices for stability and normal operation.

Proactive Monitoring: Security and network teams should actively monitor for signs of exploitation attempts. This includes monitoring for unexpected PFE crashes or device reboots on SRX4700 devices. Review system logs for error messages related to the Packet Forwarding Engine. Network monitoring tools should be configured to alert on unusual traffic patterns or malformed packets directed at the affected devices.

Compensating Controls: If immediate patching is not feasible, consider implementing compensating controls to reduce the risk. Apply strict firewall filters or access control lists (ACLs) to limit the sources of traffic that can reach the affected devices, particularly from untrusted networks. If possible, deploy an upstream Intrusion Prevention System (IPS) with signatures capable of detecting and blocking the malicious traffic crafted to exploit this vulnerability.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity (CVSS 7.5) and the critical role of the affected devices in network infrastructure, we strongly recommend that organizations prioritize the immediate application of vendor-supplied security patches. The vulnerability allows an unauthenticated attacker to cause a significant network outage, posing a direct threat to business continuity. Although this CVE is not currently on the CISA KEV list, its characteristics make it a likely candidate for future inclusion. Proactive patching is the most effective strategy to mitigate this risk.