Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2807 articles · 109645 vulns · 38/41 feeds (7d)
← Back to list
6.7
CVE-2025-30650PATCHED
juniper · junos os

Junos OS: Privileged local user can gain access to a Linux-based FPC as root

Description

A Missing Authentication for Critical Function vulnerability in command processing of Juniper Networks Junos OS allows a privileged local attacker to gain access to line cards running Junos OS Evolved as root. This issue affects systems running Junos OS using Linux-based line cards. Affected line cards include: * MPC7, MPC8, MPC9, MPC10, MPC11 * LC2101, LC2103 * LC480, LC4800, LC9600 * MX304 (built-in FPC) * MX-SPC3 * SRX5K-SPC3 * EX9200-40XS * FPC3-PTX-U2, FPC3-PTX-U3 * FPC3-SFF-PTX * LC1101, LC1102, LC1104, LC1105 This issue affects Junos OS:  * all versions before 22.4R3-S8,  * from 23.2 before 23.2R2-S6,  * from 23.4 before 23.4R2-S6,  * from 24.2 before 24.2R2-S3,  * from 24.4 before 24.4R2, * from 25.2 before 25.2R2.

Affected Products

VendorProductVersions
juniperjunos os0, 23.2, 23.4, 24.2, 24.4, 25.2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
juniperjunoscert_advisory90%
juniperjunos spacecert_advisory90%
juniperjuniper mx seriescert_advisory90%
juniperjuniper qfx seriescert_advisory90%
juniperapstracert_advisory90%

References

  • https://github.com/orangecertcc/security-research/security/advisories/GHSA-fwhc-gh5m-v8fq(third-party-advisory)
  • https://kb.juniper.net/JSA107863(vendor-advisory)

Related News (3 articles)

Tier B
BSI Advisories12h ago
[NEU] [hoch] Juniper Patchday April 2026: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
CERT-FR22h ago
Multiples vulnérabilités dans les produits Juniper Networks (09 avril 2026)
→ No new info (linked only)
Tier C
VulDB1d ago
CVE-2025-30650 | Juniper Junos OS up to 25.2R1 missing authentication (JSA107863)
→ No new info (linked only)
CVSS 3.16.7 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
22.4R3-S823.2R2-S623.4R2-S624.2R2-S324.4R225.2R2
CWECWE-306
PublishedApr 8, 2026
Trending Score42
Source articles3
Independent3
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

PRE-CVE
Multiple vulnerabilities in Juniper Networks products including Junos OS and Apstra
Trending: 20
HIGHCVE-2026-33797
Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset
HIGHCVE-2026-33790
Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 packet will cause the srxpfe process to crash and restart.
CRITICALCVE-2026-33784
JSI Virtual Lightweight Collector: Default password is not required to be changed which allows unauthorized high-privileged access
MEDIUMCVE-2026-33787
Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 8, 2026
Discovered by ZDM
Apr 8, 2026
Patch Available
Apr 9, 2026