vulnerability

Juniper Junos OS: 2025-04 Security Bulletin: Junos OS: MX Series: In DS-lite and NAT senario receipt of crafted IPv6 traffic causes port block (JSA96449) (CVE-2025-21594)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
04/09/2025
Added
04/10/2025
Modified
04/11/2025

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the pfe (packet forwarding engine) of Juniper Networks Junos OS on MX Series causes a port within a pool to be blocked leading to Denial of Service (DoS).

In a DS-Lite (Dual-Stack Lite) and NAT (Network Address Translation) scenario, when crafted IPv6 traffic is received and prefix-length is set to 56, the ports assigned to the user will not be freed.  Eventually, users cannot establish new connections. Affected FPC/PIC need to be manually restarted to recover.
Following is the command to identify the issue: 

user@host> show services nat source port-block 
Host_IP                     External_IP                   Port_Block      Ports_Used/       Block_State/
                                                              Range           Ports_Total       Left_Time(s)
2001::                        x.x.x.x                     58880-59391     256/256*1         Active/-       >>>>>>>>port still usedThis issue affects Junos OS on MX Series: 

* from 21.2 before 21.2R3-S8, 
* from 21.4 before 21.4R3-S7, 
* from 22.1 before 22.1R3-S6, 
* from 22.2 before 22.2R3-S4, 
* from 22.3 before 22.3R3-S3, 
* from 22.4 before 22.4R3-S2, 
* from 23.2 before 23.2R2-S1, 
* from 23.4 before 23.4R1-S2, 23.4R2.

This issue does not affect versions before 20.2R1.

Solution

juniper-junos-os-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.