NULL Pointer Dereference in Juniper Networks Junos OS on SRX Series
CVE-2025-30645
Summary
A NULL Pointer Dereference vulnerability exists in the flow daemon (flowd) of Juniper Networks' Junos OS on SRX Series devices. This flaw allows attackers to craft specific valid control traffic directed out of a Dual-Stack Lite tunnel, leading to a crash of the flowd process. Consequently, this produces a denial of service (DoS) condition within the network. The issue manifests as a segmentation fault, disrupting network operations until the flowd process is restarted. Administrators should be aware of this vulnerability and ensure they are running the appropriate patched versions to mitigate risks associated with continuous exploitation of control traffic.
Affected Version(s)
Junos OS SRX Series 0 < 21.2R3-S9
Junos OS SRX Series 21.4 < 21.4R3-S9
Junos OS SRX Series 22.2 < 22.2R3-S5
References
CVSS V4
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved