关键漏洞信息 漏洞概述 CVE编号: CVE-2025-52953 标题: Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset 严重性: Medium (CVSS v3.1: 6.5) 影响产品 Junos OS: - All versions before 21.2R3-S9, 21.4R3-S11, 22.2R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2, 24.4R2. Junos OS Evolved: - All versions before 22.2R3-S7-EVO, 22.4R2-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S4-EVO, 24.2R2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO. 问题描述 漏洞类型: Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) 影响: Unauthenticated adjacent attacker can send a valid BGP UPDATE packet to cause a BGP session reset, leading to Denial of Service (DoS). 受影响协议: IBGP and eBGP 受影响IP版本: IPv4 and IPv6 解决方案 修复版本: - Junos OS: 21.2R3-S9, 21.4R3-S11, 22.2R3-S7, 23.2R2-S4, 23.4R2-S4, 24.2R2, 24.4R1-S3, 24.4R2, 25.2R1, and all subsequent releases. - Junos OS Evolved: 22.2R3-S7-EVO, 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S4-EVO, 24.2R2-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases. 绕过方法 已知绕过方法: None 相关链接 CVE详情