CVE-2025-52960

MEDIUM

Juniper Junos < 22.4 - Buffer Overflow

Title source: rule
STIX 2.1

Description

A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIP packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series:  * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2.

References (2)

Core 2
Core References
Vendor Advisory vendor-advisory
https://supportportal.juniper.net/JSA103143
Vendor Advisory vendor-advisory
https://kb.juniper.net/JSA103143

Scores

CVSS v3 5.9
EPSS 0.0005
EPSS Percentile 15.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (5)
juniper/junos 22.4 (14 CPE variants)
juniper/junos 23.2 (8 CPE variants)
juniper/junos 23.4 (9 CPE variants)
juniper/junos 24.2 (4 CPE variants)
juniper/junos < 22.4
Published Oct 09, 2025
Tracked Since Feb 18, 2026