CVE-2025-30646

MEDIUM
Published Apr 9, 2025 Modified Jan 26, 2026 CWE-195

Description

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS).  Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. When an LLDP telemetry subscription is active, receipt of a specifically malformed LLDP TLV causes the l2cpd process to crash and restart. This issue affects: Junos OS: * All versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S10,  * from 22.2 before 22.2R3-S6,  * from 22.4 before 22.4R3-S6,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S4,  * from 24.2 before 24.2R2;  Junos OS Evolved:  * All versions before 21.4R3-S10-EVO, * from 22.2-EVO before 22.2R3-S6-EVO,  * from 22.4-EVO before 22.4R3-S6-EVO,  * from 23.2-EVO before 23.2R2-S3-EVO,  * from 23.4-EVO before 23.4R2-S4-EVO,  * from 24.2-EVO before 24.2R2-EVO.

CVSS v3.1 Score

6.5
MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weakness Type (CWE)

CWE-195 CWE-195

Affected Products

Vendor Product
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved
juniper junos_os_evolved

References

Frequently Asked Questions

What is CVE-2025-30646? +
A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS).  Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. When an LLDP telemetry subscription is active, receipt of a specifically malformed LLDP TLV causes the l2cpd process to crash and restart. This issue affects: Junos OS: * All versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S10,  * from 22.2 before 22.2R3-S6,  * from 22.4 before 22.4R3-S6,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S4,  * from 24.2 before 24.2R2;  Junos OS Evolved:  * All versions before 21.4R3-S10-EVO, * from 22.2-EVO before 22.2R3-S6-EVO,  * from 22.4-EVO before 22.4R3-S6-EVO,  * from 23.2-EVO before 23.2R2-S3-EVO,  * from 23.4-EVO before 23.4R2-S4-EVO,  * from 24.2-EVO before 24.2R2-EVO. It has a CVSS v3.1 base score of 6.5 (MEDIUM).
How severe is CVE-2025-30646? +
CVE-2025-30646 has a CVSS v3.1 score of 6.5 out of 10, rated MEDIUM. This is a medium-severity vulnerability that should be remediated as part of regular maintenance.
What products are affected by CVE-2025-30646? +
CVE-2025-30646 affects products from juniper, specifically: junos, junos_os_evolved. Check the affected products table above for specific version ranges.
How do I check if I'm vulnerable to CVE-2025-30646? +
You can use Secably's free Website Scanner to check your website for known vulnerabilities. For infrastructure scanning, use the Port Scanner to identify exposed services that may be affected. Check the vendor advisories linked above for specific patch and version information.

Related Vulnerabilities

Don't wait for an exploit

Scan your website for vulnerabilities like CVE-2025-30646 — free, no signup required.

Start Free Scan