{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-52982","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2025-06-23T18:23:44.546Z","datePublished":"2025-07-11T15:08:53.931Z","dateUpdated":"2025-07-15T19:55:34.678Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["MX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"21.2R3-S9","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.4*","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.2R3-S6","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.4R3-S6","status":"affected","version":"22.4","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"To be affected by this issue two or more service sets need to be present:<br><br><tt>[ services service-set &lt;set1&gt; ... ]<br>[ services service-set &lt;set2&gt; ... ]</tt>"}],"value":"To be affected by this issue two or more service sets need to be present:\n\n[ services service-set <set1> ... ]\n[ services service-set <set2> ... ]"}],"datePublic":"2025-07-09T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br><br>When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC.<br><p>This issue affects Junos OS:</p><p></p><ul><li>all versions before 21.2R3-S9,</li><li>21.4 versions from 21.4R1,</li><li>22.2 versions before 22.2R3-S6,</li><li>22.4 versions before 22.4R3-S6.</li></ul><p></p>As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected.<br><br>This issue does not affect MX-SPC3 or SRX Series devices."}],"value":"An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC.\nThis issue affects Junos OS:\n\n\n\n  *  all versions before 21.2R3-S9,\n  *  21.4 versions from 21.4R1,\n  *  22.2 versions before 22.2R3-S6,\n  *  22.4 versions before 22.4R3-S6.\n\n\n\n\nAs the MS-MPC is EoL after Junos OS 22.4, later versions are not affected.\n\nThis issue does not affect MX-SPC3 or SRX Series devices."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"YES","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":8.2,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-404","description":"CWE-404 Improper Resource Shutdown or Release","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2025-07-11T15:08:53.931Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA100088"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: 21.2R3-S9, 22.2R3-S6, 22.4R3-S6, and all subsequent releases."}],"value":"The following software releases have been updated to resolve this specific issue: 21.2R3-S9, 22.2R3-S6, 22.4R3-S6, and all subsequent releases."}],"source":{"advisory":"JSA100088","defect":["1806872"],"discovery":"USER"},"title":"Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">There are no known workarounds for this issue.</span><br><br><span style=\"background-color: rgb(255, 255, 255);\">To reduce the risk of exploitation customers not requiring the SIP ALG functionality could explicitly disable it (in case it's by default enabled) by configuring:</span><br><br><tt>[ security alg sip disable ]</tt>"}],"value":"There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation customers not requiring the SIP ALG functionality could explicitly disable it (in case it's by default enabled) by configuring:\n\n[ security alg sip disable ]"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-11T16:05:03.744264Z","id":"CVE-2025-52982","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-15T19:55:34.678Z"}}]}}