Home

Description

An Uncontrolled Resource Consumption vulnerability in the HTTP daemon (httpd) of Juniper Networks Junos Space allows an unauthenticated network-based attacker flooding the device with inbound API calls to consume all resources on the system, leading to a Denial of Service (DoS). After continuously flooding the system with inbound connection requests, all available file handles become consumed, blocking access to the system via SSH and the web user interface (WebUI), resulting in a management interface DoS. A manual reboot of the system is required to restore functionality. This issue affects Junos Space: * all versions before 22.2R1 Patch V3, * from 23.1 before 23.1R1 Patch V3.

PUBLISHED Reserved 2025-09-23 | Published 2025-10-09 | Updated 2025-10-09 | Assigner juniper




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:U/V:C/RE:M

Problem types

CWE-400 Uncontrolled Resource Consumption

Product status

Default status
unaffected

Any version before 22.2R1 Patch V3
affected

23.1 before 23.1R1 Patch V3
affected

References

supportportal.juniper.net/JSA103172 vendor-advisory

cve.org (CVE-2025-59975)

nvd.nist.gov (CVE-2025-59975)

Download JSON