CVE-2025-52960
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-09

Last updated on: 2025-12-01

Assigner: Juniper Networks, Inc.

Description
A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIPΒ packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series:Β  * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-09
Last Modified
2025-12-01
Generated
2026-05-07
AI Q&A
2025-10-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
juniper juniper_networks_junos_os 24.2r2
juniper juniper_networks_junos_os *
juniper juniper_networks_junos_os 22.4r3-s7
juniper juniper_networks_junos_os 23.2r2-s4
juniper juniper_networks_junos_os 23.4r2-s5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Buffer Copy without Checking Size of Input issue in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series devices. It allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS) by sending specific SIP packets when the device's memory utilization is high, causing the flowd process to crash. Although the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these packets under high memory utilization can cause a sustained DoS condition.


How can this vulnerability impact me? :

The vulnerability can cause a Denial of Service (DoS) on affected Junos OS devices, leading to crashes of the flowd process and disruption of service stability. While the system recovers automatically, repeated exploitation under high memory utilization can cause sustained service outages, impacting network availability and reliability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart