Improper Condition Check in Junos OS Flow Processing Daemon Affects Juniper Networks Products
CVE-2025-52981

8.7HIGH

Key Information:

Status
Vendor
CVE Published:
11 July 2025

Badges

👾 Exploit Exists

What is CVE-2025-52981?

A vulnerability exists in the flow processing daemon (flowd) of Juniper Networks' Junos OS, affecting SRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series devices. An unauthenticated network-based attacker can exploit this flaw by sending a specific sequence of Protocol Independent Multicast (PIM) packets, triggering an unexpected crash of the flowd process. This results in a Denial-of-Service condition, disrupting the normal operation of affected devices. Ensure timely updates to mitigate this risk and maintain network integrity.

Affected Version(s)

Junos OS SRX Series 0 < 21.2R3-S9

Junos OS SRX Series 21.4 < 21.4R3-S11

Junos OS SRX Series 22.2 < 22.2R3-S7

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-52981 : Improper Condition Check in Junos OS Flow Processing Daemon Affects Juniper Networks Products