Buffer Copy Vulnerability in Juniper Networks Junos OS Affects MX and SRX Series
CVE-2025-52960

8.2HIGH

Key Information:

Status
Vendor
CVE Published:
9 October 2025

Badges

👾 Exploit Exists

What is CVE-2025-52960?

A vulnerability exists in the Session Initialization Protocol (SIP) ALG of Juniper Networks' Junos OS, affecting MX Series and SRX Series devices. This flaw allows an unauthenticated, network-based attacker to induce a Denial of Service (DoS) condition by sending specific SIP packets when memory utilization is high. Although the system attempts to recover automatically, service stability may be severely disrupted. The sustained receipt of these packets during high utilization can lead to continuous service interruptions, underscoring the importance of prompt updates to secured versions.

Affected Version(s)

Junos OS SRX Series 0 < 22.4R3-S7

Junos OS SRX Series 23.2 < 23.2R2-S4

Junos OS SRX Series 23.4 < 23.4R2-S5

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-52960 : Buffer Copy Vulnerability in Juniper Networks Junos OS Affects MX and SRX Series