An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to cause impact to confidentiality and availability.
When an output firewall filter is configured with one or more terms where the action is 'reject', packets matching these terms are erroneously sent to the Routing Engine (RE) and further processed there. Processing of these packets will consume limited RE resources. Also responses from the RE back to the source of this traffic could reveal confidential information about the affected device.
This issue only applies to firewall filters applied to WAN or revenue interfaces, so not the mgmt or lo0 interface of the routing-engine, nor any input filters.
This issue affects Junos OS Evolved on PTX Series:
* all versions before 22.4R3-EVO,
* 23.2 versions before 23.2R2-EVO.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA103147 |
|
History
Fri, 23 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper ptx1000
Juniper ptx10001-36mr Juniper ptx10002 Juniper ptx10003 Juniper ptx10004 Juniper ptx10008 Juniper ptx10016 Juniper ptx3000 Juniper ptx5000 |
|
| CPEs | cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper ptx1000
Juniper ptx10001-36mr Juniper ptx10002 Juniper ptx10003 Juniper ptx10004 Juniper ptx10008 Juniper ptx10016 Juniper ptx3000 Juniper ptx5000 |
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos Os Evolved |
|
| Vendors & Products |
Juniper
Juniper junos Os Evolved |
Thu, 09 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to cause impact to confidentiality and availability. When an output firewall filter is configured with one or more terms where the action is 'reject', packets matching these terms are erroneously sent to the Routing Engine (RE) and further processed there. Processing of these packets will consume limited RE resources. Also responses from the RE back to the source of this traffic could reveal confidential information about the affected device. This issue only applies to firewall filters applied to WAN or revenue interfaces, so not the mgmt or lo0 interface of the routing-engine, nor any input filters. This issue affects Junos OS Evolved on PTX Series: * all versions before 22.4R3-EVO, * 23.2 versions before 23.2R2-EVO. | |
| Title | Junos OS Evolved: PTX Series: When a firewall filter rejects traffic these packets are erroneously sent to the RE | |
| Weaknesses | CWE-754 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: juniper
Published: 2025-10-09T15:44:33.938Z
Updated: 2025-10-09T19:05:31.001Z
Reserved: 2025-09-23T18:19:06.954Z
Link: CVE-2025-59958
Updated: 2025-10-09T19:05:28.069Z
Status : Analyzed
Published: 2025-10-09T16:15:45.950
Modified: 2026-01-23T18:36:15.230
Link: CVE-2025-59958
No data.