Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52961: CWE-400 Uncontrolled Resource Consumption in Juniper Networks Junos OS Evolved

0
Medium
VulnerabilityCVE-2025-52961cvecve-2025-52961cwe-400
Published: Thu Oct 09 2025 (10/09/2025, 15:40:52 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS Evolved

Description

An Uncontrolled Resource Consumption vulnerability in the Connectivity Fault Management (CFM) daemon and the Connectivity Fault Management Manager (cfmman) of Juniper Networks Junos OS Evolved on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, PTX10016 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). An attacker on an adjacent device sending specific valid traffic can cause cfmd to spike the CPU to 100% and cfmman's memory to leak, eventually to cause the FPC crash and restart. Continued receipt and processes of these specific valid packets will sustain the Denial of Service (DoS) condition. An indicator of compromise is to watch for an increase in cfmman memory rising over time by issuing the following command and evaluating the RSS number. If the RSS is growing into GBs then consider restarting the device to temporarily clear memory.   user@device> show system processes node fpc<num> detail | match cfmman Example:    show system processes node fpc0 detail | match cfmman    F S UID       PID       PPID PGID   SID   C PRI NI  ADDR SZ    WCHAN   RSS     PSR STIME TTY         TIME     CMD   4 S root      15204     1    15204  15204 0 80  0   - 90802     -      113652   4  Sep25 ?           00:15:28 /usr/bin/cfmman -p /var/pfe -o -c /usr/conf/cfmman-cfg-active.xml This issue affects Junos OS Evolved on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, PTX10016: * from 23.2R1-EVO before 23.2R2-S4-EVO, * from 23.4 before 23.4R2-S4-EVO, * from 24.2 before 24.2R2-EVO, * from 24.4 before 24.4R1-S2-EVO, 24.4R2-EVO. This issue does not affect Junos OS Evolved on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, PTX10016 before 23.2R1-EVO.

AI-Powered Analysis

AILast updated: 10/09/2025, 16:10:22 UTC

Technical Analysis

CVE-2025-52961 is a resource exhaustion vulnerability classified under CWE-400 affecting Juniper Networks Junos OS Evolved on specific PTX series routers. The flaw resides in the Connectivity Fault Management (CFM) daemon (cfmd) and the Connectivity Fault Management Manager (cfmman). An attacker located on an adjacent network segment can exploit this by sending specially crafted but valid CFM packets that cause the cfmd process to spike CPU usage to 100% and cause cfmman to leak memory continuously. Over time, this resource exhaustion leads to the failure and restart of the Flexible PIC Concentrator (FPC), effectively causing a Denial-of-Service (DoS) condition. The attack requires no authentication or user interaction, making it easier to exploit in environments where adjacent network access is possible. The vulnerability affects Junos OS Evolved versions starting from 23.2R1-EVO up to 24.4R2-EVO on PTX10001-36MR, PTX10002-36QDD, PTX10004, PTX10008, and PTX10016 hardware platforms. Operators can monitor the memory usage of cfmman using system commands to detect abnormal growth in resident set size (RSS), which can reach gigabytes before a crash occurs. No patches or exploit code are currently publicly available, but the vulnerability is officially published and tracked with a CVSS v3.1 score of 6.5, indicating a medium severity level primarily due to the impact on availability. The vulnerability does not affect versions prior to 23.2R1-EVO.

Potential Impact

European organizations relying on Juniper PTX series routers running affected Junos OS Evolved versions face potential network disruptions due to this vulnerability. The Denial-of-Service condition can cause critical network infrastructure components to crash and restart, leading to temporary loss of routing and connectivity services. This can impact ISPs, data centers, large enterprises, and telecom providers that use these routers for backbone or edge routing. The lack of authentication requirement and the ability to exploit from an adjacent network segment increase the risk, especially in environments with less segmented or poorly controlled network access. Sustained DoS attacks could degrade service availability, affecting business continuity and potentially violating regulatory requirements for network uptime and reliability. The vulnerability could also be leveraged as part of a larger attack chain targeting network infrastructure. While no known exploits exist yet, the medium CVSS score and the critical role of affected devices underscore the importance of timely mitigation.

Mitigation Recommendations

1. Upgrade affected Junos OS Evolved versions to fixed releases once available from Juniper Networks, as no patches are currently listed but should be prioritized upon release. 2. Implement strict network segmentation and access controls to limit adjacency and prevent unauthorized devices from sending CFM traffic to critical routers. 3. Monitor cfmman process memory usage regularly using the command 'show system processes node fpc<num> detail | match cfmman' to detect abnormal RSS growth indicative of exploitation attempts. 4. Consider automated alerts for unusual CPU spikes on cfmd and memory leaks on cfmman to enable rapid incident response. 5. Temporarily, restarting the affected device can clear memory leaks but is not a long-term solution. 6. Employ network anomaly detection systems capable of identifying unusual CFM traffic patterns. 7. Coordinate with Juniper support for guidance and early access to patches or workarounds. 8. Review and harden adjacent network segments to reduce exposure to unauthenticated traffic targeting CFM services. 9. Document and test incident response plans specifically for network device DoS scenarios to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2025-06-23T13:17:37.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7da5eba0e608b4fa05b8c

Added to database: 10/9/2025, 3:53:02 PM

Last enriched: 10/9/2025, 4:10:22 PM

Last updated: 10/11/2025, 1:22:24 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats