vulnerability

Juniper Junos OS: 2026-01 Security Bulletin: Junos OS and Junos OS Evolved: BGP update with a set of specific attributes causes rpd crash (JSA103166) (CVE-2025-60003)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Jan 14, 2026
Added
Jan 27, 2026
Modified
Feb 12, 2026

Description

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer.This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring:[ protocols bgp ... disable-4byte-as ]Established BGP sessions can be checked by executing:show bgp neighbor <IP address> | match "4 byte AS"

Solution

juniper-junos-os-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.