Junos OS: SRX Series and MX Series: Receipt of specific SIP packets in a high utilization situation causes a flowd crash
CVE-2025-52960

8.2HIGH

Key Information:

Status
Vendor
CVE Published:
9 October 2025

Badges

👾 Exploit Exists

What is CVE-2025-52960?

A Buffer Copy without Checking Size of Input vulnerability in the

Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).

When memory utilization is high, and specific SIP packets are received, flowd crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series: 

  • All versions before 22.4R3-S7,
  • from 23.2 before 23.2R2-S4,
  • from 23.4 before 23.4R2-S5,
  • from 24.2 before 24.2R2.

Affected Version(s)

Junos OS SRX Series 0 < 22.4R3-S7

Junos OS SRX Series 23.2 < 23.2R2-S4

Junos OS SRX Series 23.4 < 23.4R2-S5

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-52960 : Buffer Copy Vulnerability in Juniper Networks Junos OS Affects MX and SRX Series