An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service.
Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface.
This issue affects Junos OS:
* All versions before 21.2R3-S9,
* from 21.4 before 21.4R3-S11,
* from 22.2 before 22.2R3-S7,
* from 22.4 before 22.4R3-S7,
* from 23.2 before 23.2R2-S4,
* from 23.4 before 23.4R2-S5,
* from 24.2 before 24.2R2-S1,
* from 24.4 before 24.4R1-S3, 24.4R2.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA100078 |
|
History
Fri, 23 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos |
|
| CPEs | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s8:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s10:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s7:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s8:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s9:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r2-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:24.4:r2:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper junos |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Fri, 11 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 11 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service. Users with "view" permissions can run a specific request interface command which allows the user to shut down the interface. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S11, * from 22.2 before 22.2R3-S7, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2-S1, * from 24.4 before 24.4R1-S3, 24.4R2. | |
| Title | Junos OS: A low-privileged user can disable an interface | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: juniper
Published: 2025-07-11T15:06:26.737Z
Updated: 2025-07-11T20:11:51.358Z
Reserved: 2025-06-23T13:17:37.424Z
Link: CVE-2025-52963
Updated: 2025-07-11T20:11:46.787Z
Status : Analyzed
Published: 2025-07-11T15:15:26.817
Modified: 2026-01-23T19:37:39.060
Link: CVE-2025-52963
No data.