Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks:
Junos OS:
* All versions before 22.2R3-S1,
* from 22.4 before 22.4R2.
This feature is not enabled by default.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21157 | An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Networks Junos OS on MX Series with MPC-BUILTIN, MPC1 through MPC9 line cards allows an unauthenticated adjacent attacker to send a malformed packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions before 22.2R3-S1, * from 22.4 before 22.4R2. This feature is not enabled by default. |
Solution
The following software releases have been updated to resolve these issues: Junos OS: 22.2R3-S1, 22.4R2, 23.2R1, and all subsequent releases.
Workaround
There are no known workarounds for this issue.
Mon, 26 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper 2x100ge \+ 4x10ge Mpc5e Juniper 2x100ge \+ 4x10ge Mpc5eq Juniper 2x100ge \+ 8x10ge Mpc4e Juniper 32x10ge Mpc4e Juniper 6x40ge \+ 24x10ge Mpc5e Juniper 6x40ge \+ 24x10ge Mpc5eq Juniper junos Juniper mpc1 Juniper mpc1 Q Juniper mpc1e Juniper mpc1e Q Juniper mpc2 Juniper mpc2 Eq Juniper mpc2 Q Juniper mpc2e Juniper mpc2e Eq Juniper mpc2e Ng Juniper mpc2e Ng Q Juniper mpc2e P Juniper mpc2e Q Juniper mpc3e Juniper mpc3e-3d-ng Juniper mpc3e-3d-ng-q Juniper mpc6e Juniper mpc7e-10g Juniper mpc7e-mrate Juniper mpc8e Juniper mpc9e Juniper mx2008 Juniper mx2010 Juniper mx2020 Juniper mx240 Juniper mx480 Juniper mx960 |
|
| CPEs | cpe:2.3:h:juniper:2x100ge_\+_4x10ge_mpc5e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:2x100ge_\+_4x10ge_mpc5eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:2x100ge_\+_8x10ge_mpc4e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:32x10ge_mpc4e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:6x40ge_\+_24x10ge_mpc5e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:6x40ge_\+_24x10ge_mpc5eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1e_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2_eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_ng:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_ng_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_p:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc3e-3d-ng-q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc3e-3d-ng:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc3e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc6e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc7e-10g:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc7e-mrate:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc8e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc9e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper 2x100ge \+ 4x10ge Mpc5e Juniper 2x100ge \+ 4x10ge Mpc5eq Juniper 2x100ge \+ 8x10ge Mpc4e Juniper 32x10ge Mpc4e Juniper 6x40ge \+ 24x10ge Mpc5e Juniper 6x40ge \+ 24x10ge Mpc5eq Juniper junos Juniper mpc1 Juniper mpc1 Q Juniper mpc1e Juniper mpc1e Q Juniper mpc2 Juniper mpc2 Eq Juniper mpc2 Q Juniper mpc2e Juniper mpc2e Eq Juniper mpc2e Ng Juniper mpc2e Ng Q Juniper mpc2e P Juniper mpc2e Q Juniper mpc3e Juniper mpc3e-3d-ng Juniper mpc3e-3d-ng-q Juniper mpc6e Juniper mpc7e-10g Juniper mpc7e-mrate Juniper mpc8e Juniper mpc9e Juniper mx2008 Juniper mx2010 Juniper mx2020 Juniper mx240 Juniper mx480 Juniper mx960 |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Fri, 11 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 11 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Networks Junos OS on MX Series with MPC-BUILTIN, MPC1 through MPC9 line cards allows an unauthenticated adjacent attacker to send a malformed packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions before 22.2R3-S1, * from 22.4 before 22.4R2. This feature is not enabled by default. | |
| Title | Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-07-11T20:10:52.673Z
Reserved: 2025-06-23T13:16:01.409Z
Link: CVE-2025-52952
Updated: 2025-07-11T20:10:48.637Z
Status : Analyzed
Published: 2025-07-11T15:15:25.930
Modified: 2026-01-26T18:31:02.710
Link: CVE-2025-52952
No data.
OpenCVE Enrichment
Updated: 2025-07-12T23:05:32Z
EUVD