CVE-2025-52960

Severity
8.2HIGH
EPSS
0.1%
top 84.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9

Description

A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIP packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, wh

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os23.223.2R2-S4+3
NVDjuniper/junos< 22.4+4

🔴Vulnerability Details

2
CVEList
Junos OS: SRX Series and MX Series: Receipt of specific SIP packets in a high utilization situation causes a flowd/mspmand crash2025-10-09
GHSA
GHSA-43j4-83fv-5vcm: A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series2025-10-09

📋Vendor Advisories

1
Juniper
CVE-2025-52960: A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Serie2025-10-09
CVE-2025-52960 (HIGH CVSS 8.2) | A Buffer Copy without Checking Size | cvebase.io