CVE-2025-30649
Severity CVSS v4.0:
HIGH
Type:
CWE-20
Input Validation
Publication date:
09/04/2025
Last modified:
11/04/2025
Description
An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs.<br />
<br />
Continued receipt and processing of these specific packets will sustain the DoS condition.<br />
<br />
This issue affects Junos OS: * All versions before 22.2R3-S6,<br />
* from 22.4 before 22.4R3-S4,<br />
* from 23.2 before 23.2R2-S3,<br />
* from 23.4 before 23.4R2-S4,<br />
* from 24.2 before 24.2R1-S2, 24.2R2<br />
<br />
<br />
An indicator of compromise will indicate the SPC3 SPUs utilization has spiked.<br />
<br />
<br />
For example: <br />
user@device> show services service-sets summary<br />
Service sets CPU<br />
Interface configured Bytes used Session bytes used Policy bytes used utilization<br />
"interface" 1 "bytes" (percent%) "sessions" ("percent"%) "bytes" ("percent"%) 99.97 % OVLD
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH