Improper Input Validation in Junos OS Affects Juniper Networks Devices
CVE-2025-30649
Summary
An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks' Junos OS affects MX240, MX480, and MX960 devices equipped with the MX-SPC3 Security Services Card. This vulnerability allows unauthenticated, network-based attackers to generate specially crafted packets, leading to Denial of Service (DoS) conditions by overwhelming the CPU of the MX-SPC3 SPUs. Continuous processing of these malicious packets can exacerbate the DoS situation. Indicators of compromise include a significant spike in SPC3 SPUs utilization, observable through system commands that showcase CPU overload and resource usage.
Affected Version(s)
Junos OS MX240 0 < 22.2R3-S6
Junos OS MX240 22.4 < 22.4R3-S4
Junos OS MX240 23.2 < 23.2R2-S3
References
CVSS V4
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved