Vulnerability Description
A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When memory utilization is high, and specific SIP packets are received, flowd/mspmand crashes. While the system recovers automatically, the disruption can significantly impact service stability. Continuous receipt of these specific SIP packets, while high utilization is present, will cause a sustained DoS condition. The utilization is outside the attackers control, so they would not be able to deterministically exploit this. This issue affects Junos OS on SRX Series and MX Series: * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | < 22.4 |
| Juniper | Mx10004 | - |
| Juniper | Mx10008 | - |
| Juniper | Mx2008 | - |
| Juniper | Mx2010 | - |
| Juniper | Mx2020 | - |
| Juniper | Mx204 | - |
| Juniper | Mx240 | - |
| Juniper | Mx304 | - |
| Juniper | Mx480 | - |
| Juniper | Mx960 | - |
| Juniper | Srx1500 | - |
| Juniper | Srx1600 | - |
| Juniper | Srx2300 | - |
| Juniper | Srx300 | - |
| Juniper | Srx320 | - |
| Juniper | Srx340 | - |
| Juniper | Srx345 | - |
| Juniper | Srx380 | - |
| Juniper | Srx4100 | - |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA103143Vendor Advisory
- https://supportportal.juniper.net/JSA103143Vendor Advisory
FAQ
What is CVE-2025-52960?
CVE-2025-52960 is a vulnerability with a CVSS score of 5.9 (MEDIUM). A Buffer Copy without Checking Size of Input vulnerability in the Session Initialization Protocol (SIP) ALG of Juniper Networks Junos OS on MX Series and SRX Series allows an unauthenticated, networ...
How severe is CVE-2025-52960?
CVE-2025-52960 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-52960?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Mx10004, Juniper Mx10008, Juniper Mx2008, Juniper Mx2010.