CVE-2025-30656Improper Handling of Additional Special Element in Networks Junos OS

Severity
8.7HIGHNVD
EPSS
0.4%
top 39.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MS-MPC, MS-MIC and SPC3, and SRX Series, allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If the SIP ALG processes specifically formatted SIP invites, a memory corruption will occur which will lead to a crash of the FPC processing these packets. Although the system will automatically recover with the restart of

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os21.421.4R3-S10+6
NVDjuniper/junos< 21.2+7

🔴Vulnerability Details

2
CVEList
Junos OS: MX Series, SRX Series: Processing of specific SIP INVITE messages by the SIP ALG will lead to an FPC crash2025-04-09
GHSA
GHSA-w8cw-wx3m-wghj: An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with2025-04-09

📋Vendor Advisories

1
Juniper
CVE-2025-30656: An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with2025-04-09
CVE-2025-30656 — Networks Junos OS vulnerability | cvebase