CVEs
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Severity
CVSS v2
CVSS v3
CVSS v4
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Severity
CVSS v2
CVSS v3
CVSS v4
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
CVEs
CVE-2025-52980
Plugins
CVE-2025-52980
CVE-2025-52980
high
Information
CPEs
Plugins
Tenable Plugins
View all (1 total)
Coming Soon
juniper JSA100098: JSA100098 : 2025-07 Security Bulletin: Junos OS: SRX Series: J-Web can be exposed on additional interfaces (CVE-2025-6549)
(Last Updated: 7/15/2025)
juniper JSA100078: JSA100078 : 2025-07 Security Bulletin: Junos OS: A low-privileged user can disable an interface (CVE-2025-52963)
(Last Updated: 7/15/2025)
juniper JSA100092: JSA100092 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks (CVE-2025-52986)
(Last Updated: 7/15/2025)
juniper JSA100057: JSA100057 : 2025-07 Security Bulletin: Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation (CVE-2025-30661)
(Last Updated: 7/15/2025)
juniper JSA100080: JSA100080 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipa
(Last Updated: 7/15/2025)
juniper JSA100060: JSA100060 : 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute CLI commands and modify the configuration compromise the system (CVE-2025-52954)
(Last Updated: 7/15/2025)
juniper JSA100088: JSA100088 : 2025-07 Security Bulletin: Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash (CVE-2025-52982)
(Last Updated: 7/15/2025)
juniper JSA100096: JSA100096 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Annotate configuration command can be used for privilege escalation (CVE-2025-52989)
(Last Updated: 7/15/2025)
juniper JSA100058: JSA100058 : 2025-07 Security Bulletin: Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash (CVE-
(Last Updated: 7/15/2025)
juniper JSA100087: JSA100087 : 2025-07 Security Bulletin:Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash (CVE-2025-52981)
(Last Updated: 7/15/2025)
juniper JSA100055: JSA100055 : 2025-07 Security Bulletin: Junos OS: IPv6 firewall filter fails to match payload-protocol (CVE-2025-52951)
(Last Updated: 7/15/2025)
juniper JSA100089: JSA100089 : 2025-07 Security Bulletin: Junos OS: After removing ssh public key authentication root can still log in (CVE-2025-52983)
(Last Updated: 7/15/2025)
juniper JSA100050: JSA100050 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash (CVE-2025-52946)
(Last Updated: 7/15/2025)
juniper JSA100095: JSA100095 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Privilege escalation via CLI command 'request system logout' (CVE-2025-52988)
(Last Updated: 7/15/2025)
juniper JSA100060: JSA100060 : 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system (CV
(Last Updated: 7/15/2025)
juniper JSA100051: JSA100051 : 2025-07 Security Bulletin: Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface flap causes the FEB to crash (CVE-2025-52947)
(Last Updated: 7/15/2025)
juniper JSA100095: JSA100095 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout' (CVE-2025-52988)
(Last Updated: 7/15/2025)
ID
Name
Product
Family
Severity
241656
Juniper Junos OS Vulnerability (JSA100084)
Nessus
Junos Local Security Checks
high