An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on
SRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3
allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
If a sequence of specific PIM packets is received, this will cause a flowd crash and restart.
This issue affects Junos OS:
* all versions before 21.2R3-S9,
* 21.4 versions before 21.4R3-S11,
* 22.2 versions before 22.2R3-S7,
* 22.4 versions before 22.4R3-S6,
* 23.2 versions before 23.2R2-S4,
* 23.4 versions before 23.4R2-S4,
* 24.2 versions before 24.2R2.
This is a similar, but different vulnerability than the issue reported as
CVE-2024-47503, published in JSA88133.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA100087 |
Configurations
No configuration.
History
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-11 16:15
Updated : 2025-07-15 13:14
NVD link : CVE-2025-52981
Mitre link : CVE-2025-52981
CVE.ORG link : CVE-2025-52981
JSON object : View
Products Affected
No product.
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions