TROYANOSYVIRUS
Voltar para CVEs

CVE-2025-52960

MEDIUM
5.9

Descricao

A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIP packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series:  * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2.

Detalhes CVE

Pontuacao CVSS v3.15.9
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado10/9/2025
Ultima modificacao1/23/2026
Fontenvd
Avistamentos honeypot0

Produtos afetados

juniper:junosjuniper:mx10004juniper:mx10008juniper:mx2008juniper:mx2010juniper:mx2020juniper:mx204juniper:mx240juniper:mx304juniper:mx480juniper:mx960juniper:srx1500juniper:srx1600juniper:srx2300juniper:srx300juniper:srx320juniper:srx340juniper:srx345juniper:srx380juniper:srx4100juniper:srx4120juniper:srx4200juniper:srx4300juniper:srx4600juniper:srx4700juniper:srx5400juniper:srx5600juniper:srx5800

Fraquezas (CWE)

CWE-120

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.