vulnerability
Juniper Junos OS: 2026-01 Security Bulletin: Junos OS and Junos OS Evolved: BGP update with a set of specific attributes causes rpd crash (JSA103166) (CVE-2025-60003)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Jan 14, 2026 | Jan 27, 2026 | Feb 12, 2026 |
Description
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer.This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring:[ protocols bgp ... disable-4byte-as ]Established BGP sessions can be checked by executing:show bgp neighbor <IP address> | match "4 byte AS"
Solution
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.