First published: Wed Apr 09 2025(Updated: )
An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MS-MPC, MS-MIC and SPC3, and SRX Series, allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If the SIP ALG processes specifically formatted SIP invites, a memory corruption will occur which will lead to a crash of the FPC processing these packets. Although the system will automatically recover with the restart of the FPC, subsequent SIP invites will cause the crash again and lead to a sustained DoS. This issue affects Junos OS on MX Series and SRX Series: * all versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10, * 22.2 versions before 22.2R3-S6, * 22.4 versions before 22.4R3-S5, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S3, * 24.2 versions before 24.2R1-S2, 24.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | <21.2R3-S9<21.4R3-S10<22.2R3-S6<22.4R3-S5<23.2R2-S3<23.4R2-S3<24.2R1-S2<=24.2R2 |
The following software releases have been updated to resolve this specific issue: 21.2R3-S9, 21.4R3-S10, 22.2R3-S6, 22.4R3-S5, 23.2R2-S3, 23.4R2-S3, 24.2R1-S2, 24.2R2, 24.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30656 is classified as a Denial-of-Service vulnerability.
To mitigate CVE-2025-30656, update your Junos OS to a version later than 24.2R2 or apply the recommended patches provided by Juniper Networks.
CVE-2025-30656 affects Juniper Networks Junos OS on MX Series devices with MS-MPC, MS-MIC, and SPC3, as well as SRX Series devices.
Yes, CVE-2025-30656 allows unauthenticated, network-based attackers to exploit the vulnerability.
The impact of CVE-2025-30656 is a Denial-of-Service condition, potentially causing affected devices to become unresponsive.