🔐 CVE Alert

CVE-2025-30650

MEDIUM 6.7

Junos OS: Privileged local user can gain access to a Linux-based FPC as root

CVSS Score
6.7
EPSS Score
0.0%
EPSS Percentile
5th

A Missing Authentication for Critical Function vulnerability in command processing of Juniper Networks Junos OS allows a privileged local attacker to gain access to Linux-based line cards as root. This issue affects systems running Junos OS using Linux-based line cards. Affected line cards include: * MPC7, MPC8, MPC9, MPC10, MPC11 * LC2101, LC2103 * LC480, LC4800, LC9600 * MX304 (built-in FPC) * MX-SPC3 * SRX5K-SPC3 * EX9200-40XS * FPC3-PTX-U2, FPC3-PTX-U3 * FPC3-SFF-PTX * LC1101, LC1102, LC1104, LC1105 This issue affects Junos OS:  * all versions before 22.4R3-S8,  * from 23.2 before 23.2R2-S6,  * from 23.4 before 23.4R2-S6,  * from 24.2 before 24.2R2-S3,  * from 24.4 before 24.4R2, * from 25.2 before 25.2R2.

CWE CWE-306
Vendor juniper networks
Product junos os
Published Apr 8, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for juniper networks junos os

Be the first to know when new medium vulnerabilities affecting juniper networks junos os are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Juniper Networks / Junos OS
0 < 22.4R3-S8 23.2 < 23.2R2-S6 23.4 < 23.4R2-S6 24.2 < 24.2R2-S3 24.4 < 24.4R2 25.2 < 25.2R2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/orangecertcc/security-research/security/advisories/GHSA-fwhc-gh5m-v8fq kb.juniper.net: https://kb.juniper.net/JSA107863

Credits

Juniper SIRT would like to acknowledge and thank Pierre EMERIAUD & Orange CERT-CC from Orange group for responsibly reporting this vulnerability.