{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-21601","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2024-12-26T14:47:11.670Z","datePublished":"2025-04-09T19:51:36.325Z","dateUpdated":"2025-04-15T20:30:05.134Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["J-Web","Captive Portal","802.1X","Juniper Secure Connect (JSC)","Firewall Authentication"],"packageName":"AppWeb","platforms":["SRX Series","EX Series","MX240","MX480","MX960","QFX5120 Series"],"product":"Junos OS","programRoutines":[{"name":"Mbedthis AppWeb"}],"repo":"https://www.embedthis.com/appweb","vendor":"Juniper Networks","versions":[{"lessThan":"21.4R3-S9","status":"affected","version":"0","versionType":"semver"},{"lessThan":"22.2R3-S5","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.4R3-S4","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R2-S3","status":"affected","version":"23.2","versionType":"semver"},{"lessThan":"23.4R2-S3","status":"affected","version":"23.4","versionType":"semver"},{"lessThan":"24.2R1-S1, 24.2R2","status":"affected","version":"24.2","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following minimal configuration is necessary:</p><code>&nbsp; [ system services web-management ]</code>"}],"value":"The following minimal configuration is necessary:\n\n  [ system services web-management ]"}],"credits":[{"lang":"en","type":"reporter","value":"Alexander Zielke with VegaSystems GmbH & Co. KG"}],"datePublic":"2025-04-09T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of<span style=\"background-color: rgb(255, 255, 255);\">&nbsp;</span>Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an<span style=\"background-color: rgb(255, 255, 255);\">&nbsp;un</span>authenticated, network-based attacker, sending genuine traffic targeted to the device to cause the CPU to climb until the device becomes unresponsive. <br><br>Continuous receipt of these packets will create a sustained Denial of Service (DoS) condition.<br><p></p><p></p><p>This issue affects Junos OS:&nbsp;</p><p></p><ul><li>All versions before 21.4R3-S9,</li><li>from 22.2 before 22.2R3-S5,</li><li>from 22.4 before 22.4R3-S4,</li><li>from 23.2 before 23.2R2-S3,</li><li>from 23.4 before 23.4R2-S3,</li><li>from 24.2 before 24.2R1-S1, 24.2R2.</li></ul>An indicator of compromise is to review the CPU % of the httpd process in the CLI:<br>e.g.<br>&nbsp;<span style=\"background-color: var(--wht);\">&nbsp;show system processes extensive | match httpd</span><p><strong>&nbsp; </strong>PID nobody &nbsp; &nbsp; &nbsp; 52  &nbsp; 0  &nbsp; 20M&nbsp; &nbsp; 191M select &nbsp; 2 &nbsp; 0:01 &nbsp; 80.00% httpd{httpd} <strong>&lt;&lt;&lt;&lt;&lt; the percentage of httpd usage if high may be an indicator</strong></p>"}],"value":"An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an unauthenticated, network-based attacker, sending genuine traffic targeted to the device to cause the CPU to climb until the device becomes unresponsive. \n\nContinuous receipt of these packets will create a sustained Denial of Service (DoS) condition.\n\n\n\n\nThis issue affects Junos OS: \n\n\n\n  *  All versions before 21.4R3-S9,\n  *  from 22.2 before 22.2R3-S5,\n  *  from 22.4 before 22.4R3-S4,\n  *  from 23.2 before 23.2R2-S3,\n  *  from 23.4 before 23.4R2-S3,\n  *  from 24.2 before 24.2R1-S1, 24.2R2.\n\n\nAn indicator of compromise is to review the CPU % of the httpd process in the CLI:\ne.g.\n  show system processes extensive | match httpd  PID nobody       52    0    20M    191M select   2   0:01   80.00% httpd{httpd} <<<<< the percentage of httpd usage if high may be an indicator"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"YES","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"AMBER","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"CONCENTRATED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/V:C/RE:M/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"573 - Improper Following of Specification by Caller","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2025-04-09T19:51:36.325Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA96452"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: Junos OS: 21.4R3-S9, 22.2R3-S5, 22.4R3-S4, 23.2R2-S3, 23.4R2-S3, 24.2R1-S1, 24.2R2, 24.4R1, and all subsequent releases."}],"value":"The following software releases have been updated to resolve this specific issue: Junos OS: 21.4R3-S9, 22.2R3-S5, 22.4R3-S4, 23.2R2-S3, 23.4R2-S3, 24.2R1-S1, 24.2R2, 24.4R1, and all subsequent releases."}],"source":{"advisory":"JSA96452","defect":["1827265"],"discovery":"USER"},"timeline":[{"lang":"en","time":"2025-04-09T16:00:00.000Z","value":"Initial Publication"}],"title":"Junos OS: SRX and EX Series, MX240, MX480, MX960, QFX5120 Series: When web management is enabled for specific services an attacker may cause a CPU spike by sending genuine packets to the device","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"There are no known workarounds for this issue.<br><br>To reduce the risk of exploitation use authentication when using web management services.<br>"}],"value":"There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation use authentication when using web management services."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-573","lang":"en","description":"CWE-573 Improper Following of Specification by Caller"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-10T13:11:29.847130Z","id":"CVE-2025-21601","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T20:30:05.134Z"}}]}}