DarkCrystal RAT aka DCRat – Active IOCs
January 13, 2025Multiple Dell Products Vulnerabilities
January 13, 2025DarkCrystal RAT aka DCRat – Active IOCs
January 13, 2025Multiple Dell Products Vulnerabilities
January 13, 2025Severity
High
Analysis Summary
CVE-2025-21598 CVSS:7.5
An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.
CVE-2025-21602 CVSS:7.1
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS).
CVE-2025-21600 CVSS:7.1
An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
CVE-2025-21599 CVSS:8.7
A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.
CVE-2025-21596 CVSS:6.8
An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system.
CVE-2025-21593 CVSS:7.1
An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS).
CVE-2025-21592 CVSS:6.8
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.
Impact
- Denial of Service
- Gain Access
- Information Disclosure
Indicators of Compromise
CVE
CVE-2025-21598
CVE-2025-21602
CVE-2025-21600
CVE-2025-21599
CVE-2025-21596
CVE-2025-21593
CVE-2025-21592
Affected Vendors
Affected Products
- Junos OS 21.2R3-S8 - 21.2R3-S9
- Junos OS 21.4R3-S7 - 21.4R3-S9
- Junos OS 22.2R3-S4 - 22.2R3-S5
- Junos OS 22.3R3-S2 - 22.3R3-S4
- Junos OS 22.4R3 - 22.4R3-S5
- Junos OS 23.2R2 - 23.2R2-S2
- Junos OS 23.4R1 - 23.4R2-S1
- Junos OS Evolved 21.4R3-S7 EVO - 21.4R3-S9-EVO
- Junos OS Evolved 22.2R3-S4-EVO - 22.2R3-S5-EVO
- Junos OS Evolved 22.3R3-S2-EVO - 22.3R3-S4-EVO
- Junos OS Evolved 22.4R3-EVO - 22.4R3-S5-EVO
- Junos OS Evolved 23.2R2-EVO - 23.2R2-S2-EVO
- Junos OS Evolved 23.4R1-EVO - 23.4R2-S1-EVO
- Junos OS SRX Series 21.4R3-S8
- Junos OS SRX Series 22.2 before 22.2R3-S5
- Junos OS SRX Series 22.3 before 22.3R3-S3
- Junos OS SRX Series 22.4 before 22.4R3-S2
- Junos OS SRX Series 23.2 before 23.2R2-S1
- Junos OS SRX Series 23.4 before 23.4R2
Remediation
Refer to Juniper Networks Security Advisory for patch, upgrade, or suggested workaround information.