CVE-2025-52982
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-11

Last updated on: 2025-07-15

Assigner: Juniper Networks, Inc.

Description
An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC. This issue affects Junos OS: * all versions before 21.2R3-S9, * 21.4 versions from 21.4R1, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6. As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected. This issue does not affect MX-SPC3 or SRX Series devices.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-11
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
juniper junos_os *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-404 The product does not release or incorrectly releases a resource before it is made available for re-use.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Resource Shutdown or Release issue in the SIP ALG of Juniper Networks Junos OS on MX Series devices with MS-MPC. When configured with two or more service sets processing SIP calls, a specific sequence of call events can cause the MS-MPC to crash and restart. This can be triggered by an unauthenticated, network-based attacker.


How can this vulnerability impact me? :

The vulnerability can cause a Denial-of-Service (DoS) by crashing and restarting the MS-MPC on affected devices. This can disrupt SIP call processing and network services relying on the MX Series device, potentially leading to service outages.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that your Juniper Networks Junos OS on MX Series with MS-MPC is updated to a fixed version. Specifically, upgrade to Junos OS versions 21.2R3-S9 or later, 21.4 versions after 21.4R1, 22.2 versions 22.2R3-S6 or later, or 22.4 versions 22.4R3-S6 or later. Additionally, avoid configuring two or more service sets processing SIP calls simultaneously on affected devices. Note that devices with MS-MPC that are End-of-Life after Junos OS 22.4 are not affected, and MX-SPC3 or SRX Series devices are not vulnerable.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart