Vulnerability Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition. This issue affects Junos OS Evolved PTX Series: * All versions before 22.4R3-S8-EVO, * from 23.2 before 23.2R2-S5-EVO, * from 23.4 before 23.4R2-EVO, * from 24.2 before 24.2R2-EVO, * from 24.4 before 24.4R2-EVO. This issue affects Junos OS Evolved on QFX5000 Series: * 22.2-EVO version before 22.2R3-S7-EVO, * 22.4-EVO version before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S5-EVO, * 24.2-EVO versions before 24.2R2-S1-EVO, * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO. This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos Os Evolved | < 22.4 |
| Juniper | Ptx10001-36Mr | - |
| Juniper | Ptx10002-36Qdd | - |
| Juniper | Ptx10003 | - |
| Juniper | Ptx10004 | - |
| Juniper | Ptx10008 | - |
| Juniper | Ptx10016 | - |
| Juniper | Ptx12008 | - |
| Juniper | Qfx5110 | - |
| Juniper | Qfx5120 | - |
| Juniper | Qfx5130 | - |
| Juniper | Qfx5200 | - |
| Juniper | Qfx5210 | - |
| Juniper | Qfx5220 | - |
| Juniper | Qfx5230-64Cd | - |
| Juniper | Qfx5240 | - |
| Juniper | Qfx5241 | - |
| Juniper | Qfx5700 | - |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA103159Vendor Advisory
FAQ
What is CVE-2025-59969?
CVE-2025-59969 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series o...
How severe is CVE-2025-59969?
CVE-2025-59969 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59969?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos Os Evolved, Juniper Ptx10001-36Mr, Juniper Ptx10002-36Qdd, Juniper Ptx10003, Juniper Ptx10004.