Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition.

This issue affects Junos OS Evolved PTX Series:



* All versions before 22.4R3-S8-EVO,
* from 23.2 before 23.2R2-S5-EVO,
* from 23.4 before 23.4R2-EVO,
* from 24.2 before 24.2R2-EVO,
* from 24.4 before 24.4R2-EVO.




This issue affects Junos OS Evolved on QFX5000 Series:



* 22.2-EVO version before 22.2R3-S7-EVO,
* 22.4-EVO version before 22.4R3-S7-EVO,
* 23.2-EVO versions before 23.2R2-S4-EVO,
* 23.4-EVO versions before 23.4R2-S5-EVO,
* 24.2-EVO versions before 24.2R2-S1-EVO,
* 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.


This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.
Published: 2026-04-09
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: Denial of Service (DoS)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic buffer overflow in the Advanced Forwarding Toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved. An unauthenticated attacker can send specially crafted multicast packets to crash the line card processes or non‑line‑card devices. The crash causes the affected services to restart, and continued delivery of these packets results in a sustained denial‑of‑service condition for the affected device. The weakness is characterized as a buffer copy without size checking (CWE‑120).

Affected Systems

Vendors impacted are Juniper Networks, with the product Junos OS Evolved for both PTX Series and QFX5000 Series line cards. The affected release ranges include all PTX Series releases prior to 22.4R3‑S8‑EVO, 23.2R2‑S5‑EVO, 23.4R2‑EVO, 24.2R2‑EVO, and 24.4R2‑EVO, as well as QFX5000 Series releases before 22.2R3‑S7‑EVO, 22.4R3‑S7‑EVO, 23.2R2‑S4‑EVO, 23.4R2‑S5‑EVO, 24.2R2‑S1‑EVO, and 24.4R1‑S3‑EVO. Versions earlier than the listed ones are unaffected.

Risk and Exploitability

The CVSS base score of 7.1 reflects a high impact DoS vulnerability that requires no authentication but does require the attacker to be on the same broadcast domain to inject multicast traffic. EPSS data is unavailable, and the vulnerability is not currently listed in the CISA KEV catalog. Because there is no workaround, the risk is contingent upon the ability of attackers to reach the target network and persistently send malicious packets; the impact can be significant for critical services if left unpatched.

Generated by OpenCVE AI on April 9, 2026 at 22:28 UTC.

Remediation

Vendor Solution

The following software releases have been updated to resolve this specific issue: For PTX Series: 22.4R3-S8-EVO, 23.2R2-S5-EVO, 23.4R2-EVO, 24.2R2-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases. For QFX5000 Series: 22.2R3-S7-EVO, 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO, 24.4R2-EVO, 25.2R1-EVO, and all subsequent releases.


Vendor Workaround

There are no known workarounds for this issue.


OpenCVE Recommended Actions

  • Apply a Juniper OS Evolved update that includes the fix for PTX Series (22.4R3‑S8‑EVO or later) or QFX5000 Series (22.2R3‑S7‑EVO or later).
  • Confirm the device reports a compliant version by checking the running software version.
  • If an upgrade is not immediately feasible, monitor for repeated multicast packet crashes and isolate affected line cards.

Generated by OpenCVE AI on April 9, 2026 at 22:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper Networks
Juniper Networks junos Os Evolved
Vendors & Products Juniper Networks
Juniper Networks junos Os Evolved

Thu, 09 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advanced forwarding toolkit (evo-aftmand/evo-pfemand) of Juniper Networks Junos OS Evolved on PTX Series or QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).An attacker sending crafted multicast packets will cause line cards running evo-aftmand/evo-pfemand to crash and restart or non-line card devices to crash and restart. Continued receipt and processing of these packets will sustain the Denial of Service (DoS) condition. This issue affects Junos OS Evolved PTX Series: * All versions before 22.4R3-S8-EVO, * from 23.2 before 23.2R2-S5-EVO, * from 23.4 before 23.4R2-EVO, * from 24.2 before 24.2R2-EVO, * from 24.4 before 24.4R2-EVO. This issue affects Junos OS Evolved on QFX5000 Series: * 22.2-EVO version before 22.2R3-S7-EVO, * 22.4-EVO version before 22.4R3-S7-EVO, * 23.2-EVO versions before 23.2R2-S4-EVO, * 23.4-EVO versions before 23.4R2-S5-EVO, * 24.2-EVO versions before 24.2R2-S1-EVO, * 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO. This issue does not affect Junos OS Evolved on QFX5000 Series versions before: 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and 22.1R1-EVO.
Title Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will cause evo-aftmand / evo-pfemand to crash and restart
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:U/V:C/RE:M/U:Amber'}


Subscriptions

Juniper Networks Junos Os Evolved
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2026-04-09T21:25:32.594Z

Reserved: 2025-09-23T18:19:06.955Z

Link: CVE-2025-59969

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T22:16:24.100

Modified: 2026-04-09T22:16:24.100

Link: CVE-2025-59969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:28:49Z

Weaknesses