๐Ÿ” CVE Alert

CVE-2025-52988

MEDIUM 6.7

Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout'

CVSS Score
6.7
EPSS Score
0.0%
EPSS Percentile
0th

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root. When a user provides specifically crafted arguments to the 'request system logout' command, these will be executed as root on the shell, which can completely compromise the device. This issue affects: Junos OS:ย  * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S8, * 22.2 versions before 22.2R3-S6, * 22.3 versions before 22.3R3-S3, * 22.4 versions before 22.4R3-S6, * 23.2 versions before 23.2R2-S1, * 23.4 versions before 23.4R1-S2, 23.4R2; Junos OS Evolved: * all versions before 22.4R3-S6-EVO, * 23.2-EVO versions before 23.2R2-S1-EVO, * 23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO.

CWE CWE-78
Vendor juniper networks
Product junos os
Published Jul 11, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for juniper networks junos os

Be the first to know when new medium vulnerabilities affecting juniper networks junos os are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Juniper Networks / Junos OS
0 < 21.2R3-S9 21.4 < 21.4R3-S8 22.2 < 22.2R3-S6 22.3 < 22.3R3-S3 22.4 < 22.4R3-S6 23.2 < 23.2R2-S1 23.4 < 23.4R1-S2, 23.4R2
Juniper Networks / Junos OS Evolved
0 < 22.4R3-S6-EVO 23.2-EVO < 23.2R2-S1-EVO 23.4-EVO < 23.4R1-S2-EVO, 23.4R2-EVO

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
supportportal.juniper.net: https://supportportal.juniper.net/JSA100095

Credits

National Security Agency