CVE-2025-30649

Severity CVSS v4.0:
HIGH
Type:
CWE-20 Input Validation
Publication date:
09/04/2025
Last modified:
11/04/2025

Description

An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs.<br /> <br /> Continued receipt and processing of these specific packets will sustain the DoS condition.<br /> <br /> This issue affects Junos OS: * All versions before 22.2R3-S6,<br /> * from 22.4 before 22.4R3-S4,<br /> * from 23.2 before 23.2R2-S3,<br /> * from 23.4 before 23.4R2-S4,<br /> * from 24.2 before 24.2R1-S2, 24.2R2<br /> <br /> <br /> An indicator of compromise will indicate the SPC3 SPUs utilization has spiked.<br /> <br /> <br /> For example: <br />    user@device&gt; show services service-sets summary<br /> Service sets CPU<br /> Interface configured Bytes used Session bytes used Policy bytes used utilization<br /> "interface" 1 "bytes" (percent%) "sessions" ("percent"%) "bytes" ("percent"%) 99.97 % OVLD

References to Advisories, Solutions, and Tools