SB2025072339 - Firewall filter bypass in Junos OS Evolved



SB2025072339 - Firewall filter bypass in Junos OS Evolved

Published: July 23, 2025

Security Bulletin ID SB2025072339
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use of incorrect operator (CVE-ID: CVE-2025-52985)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to use of incorrect operator in the Routing Engine firewall, when a firewall filter, which is applied to the lo0 or re:mgmt interface, references a prefix list, and that prefix list contains more than 10 entries. In such case the prefix list doesn't match and packets destined to the local device are not filtered.


Remediation

Install update from vendor's website.