Description

An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC. This issue affects Junos OS: * all versions before 21.2R3-S9, * 21.4 versions from 21.4R1, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S6. As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected. This issue does not affect MX-SPC3 or SRX Series devices.

INFO

Published Date :

2025-07-11T15:08:53.931Z

Last Modified :

2025-07-15T19:55:34.678Z

Source :

juniper
AFFECTED PRODUCTS

The following products are affected by CVE-2025-52982 vulnerability.

Vendors Products
Juniper
  • Junos
  • Mx10004
  • Mx10008
  • Mx2008
  • Mx2010
  • Mx2020
  • Mx204
  • Mx240
  • Mx304
  • Mx480
  • Mx960
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-52982.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact