CVE-2025-30649

Severity CVSS v4.0:
HIGH
Type:
CWE-20 Input Validation
Publication date:
09/04/2025
Last modified:
26/01/2026

Description

An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs.<br /> <br /> Continued receipt and processing of these specific packets will sustain the DoS condition.<br /> <br /> This issue affects Junos OS: * All versions before 22.2R3-S6,<br /> * from 22.4 before 22.4R3-S4,<br /> * from 23.2 before 23.2R2-S3,<br /> * from 23.4 before 23.4R2-S4,<br /> * from 24.2 before 24.2R1-S2, 24.2R2<br /> <br /> <br /> An indicator of compromise will indicate the SPC3 SPUs utilization has spiked.<br /> <br /> <br /> For example: <br />    user@device&gt; show services service-sets summary<br /> Service sets CPU<br /> Interface configured Bytes used Session bytes used Policy bytes used utilization<br /> "interface" 1 "bytes" (percent%) "sessions" ("percent"%) "bytes" ("percent"%) 99.97 % OVLD

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* 22.2 (excluding)
cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*


References to Advisories, Solutions, and Tools