We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52982

Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash



Description

An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC. This issue affects Junos OS: * all versions before 21.2R3-S9, * 21.4 versions from 21.4R1, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6. As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected. This issue does not affect MX-SPC3 or SRX Series devices.

Reserved 2025-06-23 | Published 2025-07-11 | Updated 2025-07-11 | Assigner juniper


MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M

Problem types

CWE-404 Improper Resource Shutdown or Release

Product status

Default status
unaffected

Any version before 21.2R3-S9
affected

21.4 before 21.4*
affected

22.2 before 22.2R3-S6
affected

22.4 before 22.4R3-S6
affected

References

supportportal.juniper.net/JSA100088 vendor-advisory

cve.org (CVE-2025-52982)

nvd.nist.gov (CVE-2025-52982)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52982

Support options

Helpdesk Chat, Email, Knowledgebase