CVE-2025-52982: CWE-404 Improper Resource Shutdown or Release in Juniper Networks Junos OS
An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC. This issue affects Junos OS: * all versions before 21.2R3-S9, * 21.4 versions from 21.4R1, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6. As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected. This issue does not affect MX-SPC3 or SRX Series devices.
AI Analysis
Technical Summary
CVE-2025-52982 is a medium-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting Juniper Networks Junos OS running on MX Series devices equipped with MS-MPC modules. The vulnerability arises specifically in the SIP Application Layer Gateway (ALG) functionality when the device is configured with two or more service sets processing SIP calls concurrently. An unauthenticated, network-based attacker can trigger a specific sequence of SIP call events that causes the MS-MPC to crash and subsequently restart, resulting in a Denial-of-Service (DoS) condition. This disrupts the normal operation of the affected device, potentially interrupting network traffic and SIP-based communications. The vulnerability affects multiple versions of Junos OS: all versions before 21.2R3-S9, versions 21.4 starting from 21.4R1, versions 22.2 before 22.2R3-S6, and versions 22.4 before 22.4R3-S6. It is important to note that the MS-MPC module reached End-of-Life (EoL) after Junos OS 22.4, and later versions are not impacted. Additionally, MX-SPC3 and SRX Series devices are not affected by this issue. The CVSS v3.1 base score is 5.9, reflecting a medium severity level, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, and high impact on availability. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, suggesting that remediation may require upgrading to fixed versions or applying vendor advisories once available.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure relying on Juniper MX Series routers with MS-MPC modules, especially those handling SIP-based VoIP communications. The DoS condition caused by the crash and restart of the MS-MPC can lead to temporary loss of network routing capabilities and disruption of SIP call processing, impacting business communications and potentially critical services. Organizations in sectors such as telecommunications, finance, government, and large enterprises that depend on Juniper MX Series for core routing and SIP traffic management may experience operational outages or degraded service quality. The unauthenticated nature of the attack vector increases the risk, as attackers do not need credentials or user interaction, allowing remote exploitation from the network. Although the attack complexity is high, skilled attackers targeting specific call sequences could exploit this vulnerability to cause repeated disruptions. The lack of impact on confidentiality and integrity limits the threat to availability, but availability is critical for network infrastructure, making this a significant concern. European organizations with regulatory requirements for network uptime and service continuity (e.g., GDPR mandates on availability and resilience) must consider this vulnerability seriously.
Mitigation Recommendations
To mitigate CVE-2025-52982, European organizations should: 1) Identify all Juniper MX Series devices with MS-MPC modules in their network and verify the Junos OS versions in use. 2) Upgrade affected devices to Junos OS versions that include the fix: versions 21.2R3-S9 or later for the 21.2 branch, 21.4 versions after 21.4R1, 22.2 versions from 22.2R3-S6 onwards, and 22.4 versions from 22.4R3-S6 onwards. 3) If immediate upgrade is not feasible, consider disabling SIP ALG functionality or reducing the number of service sets processing SIP calls to one, if operationally acceptable, to avoid triggering the vulnerability. 4) Implement network segmentation and access controls to limit exposure of MX Series devices to untrusted networks, reducing the attack surface. 5) Monitor network traffic for unusual SIP call patterns that could indicate attempts to exploit this vulnerability. 6) Engage with Juniper Networks support for any available patches or workarounds and stay updated on vendor advisories. 7) Conduct regular vulnerability assessments and penetration testing focusing on SIP infrastructure and routing devices to detect potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-52982: CWE-404 Improper Resource Shutdown or Release in Juniper Networks Junos OS
Description
An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC. This issue affects Junos OS: * all versions before 21.2R3-S9, * 21.4 versions from 21.4R1, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6. As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected. This issue does not affect MX-SPC3 or SRX Series devices.
AI-Powered Analysis
Technical Analysis
CVE-2025-52982 is a medium-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting Juniper Networks Junos OS running on MX Series devices equipped with MS-MPC modules. The vulnerability arises specifically in the SIP Application Layer Gateway (ALG) functionality when the device is configured with two or more service sets processing SIP calls concurrently. An unauthenticated, network-based attacker can trigger a specific sequence of SIP call events that causes the MS-MPC to crash and subsequently restart, resulting in a Denial-of-Service (DoS) condition. This disrupts the normal operation of the affected device, potentially interrupting network traffic and SIP-based communications. The vulnerability affects multiple versions of Junos OS: all versions before 21.2R3-S9, versions 21.4 starting from 21.4R1, versions 22.2 before 22.2R3-S6, and versions 22.4 before 22.4R3-S6. It is important to note that the MS-MPC module reached End-of-Life (EoL) after Junos OS 22.4, and later versions are not impacted. Additionally, MX-SPC3 and SRX Series devices are not affected by this issue. The CVSS v3.1 base score is 5.9, reflecting a medium severity level, with the vector indicating network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, and high impact on availability. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, suggesting that remediation may require upgrading to fixed versions or applying vendor advisories once available.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure relying on Juniper MX Series routers with MS-MPC modules, especially those handling SIP-based VoIP communications. The DoS condition caused by the crash and restart of the MS-MPC can lead to temporary loss of network routing capabilities and disruption of SIP call processing, impacting business communications and potentially critical services. Organizations in sectors such as telecommunications, finance, government, and large enterprises that depend on Juniper MX Series for core routing and SIP traffic management may experience operational outages or degraded service quality. The unauthenticated nature of the attack vector increases the risk, as attackers do not need credentials or user interaction, allowing remote exploitation from the network. Although the attack complexity is high, skilled attackers targeting specific call sequences could exploit this vulnerability to cause repeated disruptions. The lack of impact on confidentiality and integrity limits the threat to availability, but availability is critical for network infrastructure, making this a significant concern. European organizations with regulatory requirements for network uptime and service continuity (e.g., GDPR mandates on availability and resilience) must consider this vulnerability seriously.
Mitigation Recommendations
To mitigate CVE-2025-52982, European organizations should: 1) Identify all Juniper MX Series devices with MS-MPC modules in their network and verify the Junos OS versions in use. 2) Upgrade affected devices to Junos OS versions that include the fix: versions 21.2R3-S9 or later for the 21.2 branch, 21.4 versions after 21.4R1, 22.2 versions from 22.2R3-S6 onwards, and 22.4 versions from 22.4R3-S6 onwards. 3) If immediate upgrade is not feasible, consider disabling SIP ALG functionality or reducing the number of service sets processing SIP calls to one, if operationally acceptable, to avoid triggering the vulnerability. 4) Implement network segmentation and access controls to limit exposure of MX Series devices to untrusted networks, reducing the attack surface. 5) Monitor network traffic for unusual SIP call patterns that could indicate attempts to exploit this vulnerability. 6) Engage with Juniper Networks support for any available patches or workarounds and stay updated on vendor advisories. 7) Conduct regular vulnerability assessments and penetration testing focusing on SIP infrastructure and routing devices to detect potential exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2025-06-23T18:23:44.546Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68712e3ba83201eaacaf5d11
Added to database: 7/11/2025, 3:31:07 PM
Last enriched: 7/18/2025, 8:50:41 PM
Last updated: 8/20/2025, 6:43:06 AM
Views: 19
Related Threats
CVE-2025-27721: CWE-497 in INFINITT Healthcare INFINITT PACS System Manager
HighCVE-2025-3128: CWE-78 in Mitsubishi Electric Europe smartRTU
CriticalCVE-2025-55107: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
MediumCVE-2025-55106: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
MediumCVE-2025-55105: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Experience Sites
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.