Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52960: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2025-52960cvecve-2025-52960cwe-120
Published: Thu Oct 09 2025 (10/09/2025, 15:40:20 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIP packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series:  * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2.

AI-Powered Analysis

AILast updated: 12/01/2025, 08:58:01 UTC

Technical Analysis

CVE-2025-52960 is a classic buffer overflow vulnerability (CWE-120) found in the SIP ALG (Application Layer Gateway) component of Juniper Networks Junos OS, specifically on MX Series and SRX Series devices. The vulnerability arises from improper handling of SIP packets where the size of input data is not properly checked before copying into a buffer. When the device is under high memory utilization, receiving specific crafted SIP packets causes the flowd/mspmand processes to crash due to memory corruption. These processes are critical for session and flow management in Junos OS. Although the system automatically recovers from the crash, repeated triggering can cause a sustained denial of service, disrupting network traffic and service availability. The attacker does not require authentication or user interaction and can launch the attack remotely over the network. However, the attack complexity is high because exploitation depends on the device being in a high memory utilization state, which the attacker cannot reliably induce. The vulnerability affects multiple Junos OS versions: all versions before 22.4R3-S7, from 23.2 before 23.2R2-S4, from 23.4 before 23.4R2-S5, and from 24.2 before 24.2R2. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 score of 5.9, indicating a medium severity level. Juniper Networks has released patches in the specified versions to address this issue.

Potential Impact

For European organizations, this vulnerability can impact critical network infrastructure that relies on Juniper MX and SRX Series devices running vulnerable Junos OS versions. These devices are commonly used in enterprise edge routing, firewalling, and session management roles. A successful attack can cause denial of service by crashing key processes, leading to network outages or degraded service availability. This can disrupt business operations, especially for service providers, financial institutions, and large enterprises with high dependency on continuous network uptime. The inability to deterministically exploit the vulnerability reduces the risk somewhat, but the potential for sustained DoS under high memory conditions remains a concern. Additionally, the automatic recovery does not prevent repeated crashes if the attack persists, potentially causing intermittent service instability. Confidentiality and integrity are not impacted, but availability degradation can affect critical communications and services. Organizations with high network traffic and memory utilization are at greater risk. The lack of known exploits in the wild currently limits immediate threat but patching is recommended to prevent future exploitation.

Mitigation Recommendations

European organizations should prioritize patching affected Junos OS devices to versions 22.4R3-S7 or later, 23.2R2-S4 or later, 23.4R2-S5 or later, and 24.2R2 or later as applicable. Network administrators should monitor memory utilization on MX and SRX devices to identify periods of high load that could increase vulnerability exposure. Implementing rate limiting or filtering of SIP traffic at network edges can reduce the likelihood of receiving malicious SIP packets. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect anomalous SIP packet patterns may help detect exploitation attempts. Network segmentation to isolate critical Junos OS devices from untrusted networks can reduce attack surface. Regularly reviewing device logs for flowd/mspmand crashes or SIP-related anomalies can provide early warning signs. Organizations should also engage with Juniper support for any additional recommended mitigations or hotfixes. Finally, maintaining an up-to-date asset inventory of Junos OS devices and their versions will aid in targeted remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T13:17:37.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7da5eba0e608b4fa05b89

Added to database: 10/9/2025, 3:53:02 PM

Last enriched: 12/1/2025, 8:58:01 AM

Last updated: 12/4/2025, 6:10:21 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats