Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-30656

Publication date:
09/04/2025
An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MS-MPC, MS-MIC and SPC3, and SRX Series, allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> If the SIP ALG processes specifically formatted SIP invites, a memory corruption will occur which will lead to a crash of the FPC processing these packets. Although the system will automatically recover with the restart of the FPC, subsequent SIP invites will cause the crash again and lead to a sustained DoS.<br /> <br /> <br /> <br /> <br /> This issue affects Junos OS on MX Series and SRX Series: <br /> <br /> * all versions before 21.2R3-S9,<br /> * 21.4 versions before 21.4R3-S10,<br /> * 22.2 versions before 22.2R3-S6,<br /> * 22.4 versions before 22.4R3-S5,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2-S3,<br /> * 24.2 versions before 24.2R1-S2, 24.2R2.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30657

Publication date:
09/04/2025
An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> When a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it&amp;#39;s sent to SRRD it&amp;#39;s encoded incorrectly which leads to a crash and momentary interruption of jflow processing until it automatically restarts. This issue does not affect traffic forwarding itself.<br /> This issue affects Junos OS: <br /> <br /> <br /> <br /> * All versions before 21.2R3-S9,<br /> * 21.4 versions before 21.4R3-S10,<br /> * 22.2 versions before 22.2R3-S6,<br /> * 22.4 versions before 22.4R3,<br /> * 23.2 versions before 23.2R1-S2, 23.2R2.<br /> <br /> <br /> <br /> This issue does not affected Junos OS Evolved.
Severity CVSS v4.0: MEDIUM
Last modification:
11/04/2025

CVE-2025-30658

Publication date:
09/04/2025
A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Series <br /> <br /> allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).<br /> <br /> On all SRX platforms with Anti-Virus enabled, if a server sends specific content in the HTTP body of a response to a client request, these packets are queued by Anti-Virus processing in Juniper Buffers (jbufs) which are never released. When these jbufs are exhausted, the device stops forwarding all transit traffic.<br /> <br /> A jbuf memory leak can be noticed from the following logs:<br /> <br /> (.) Warning: jbuf pool id utilization level (%) is above %!<br /> <br /> To recover from this issue, the affected device needs to be manually rebooted to free the leaked jbufs.<br /> <br /> <br /> <br /> <br /> This issue affects Junos OS on SRX Series: <br /> <br /> * all versions before 21.2R3-S9,<br /> * 21.4 versions before 21.4R3-S10,<br /> * 22.2 versions before 22.2R3-S6,<br /> * 22.4 versions before 22.4R3-S6,<br /> * 23.2 versions before 23.2R2-S3,<br /> * 23.4 versions before 23.4R2-S3,<br /> * 24.2 versions before 24.2R2.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30647

Publication date:
09/04/2025
A Missing Release of Memory after Effective Lifetime vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS).<br /> <br /> In a subscriber management scenario, login/logout activity triggers a memory leak, and the leaked memory gradually increments and eventually results in a crash. <br />    <br />            user@host&gt; show chassis fpc<br />                                        Temp    CPU Utilization (%)   CPU Utilization (%)   Memory     Utilization (%)<br />                       Slot State       (C)     Total   Interrupt     1min   5min  15min    DRAM (MB)  Heap   Buffer<br /> <br />                       2 Online         36       10         0          9     8     9        32768      26         0<br />                                                                                                      <br /> <br /> This issue affects Junos OS on MX Series: <br /> * All versions before 21.2R3-S9<br /> * from 21.4 before 21.4R3-S10<br /> * from 22.2 before 22.2R3-S6<br /> * from 22.4 before 22.4R3-S5<br /> * from 23.2 before 23.2R2-S3<br /> * from 23.4 before 23.4R2-S3<br /> * from 24.2 before 24.2R2.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30648

Publication date:
09/04/2025
An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS).<br /> <br /> When a specifically malformed DHCP packet is received from a DHCP client, the jdhcpd process crashes, which will lead to the unavailability of the DHCP service and thereby resulting in a sustained DoS. The DHCP process will restart automatically to recover the service.<br /> <br /> This issue will occur when dhcp-security is enabled. <br /> This issue affects Junos OS: <br /> <br /> <br /> <br /> * All versions before 21.2R3-S9, <br /> * from 21.4 before 21.4R3-S10, <br /> * from 22.2 before 22.2R3-S6, <br /> * from 22.4 before 22.4R3-S6, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S4, <br /> * from 24.2 before 24.2R2; <br /> <br /> <br /> <br /> <br /> Junos OS Evolved:  * from 22.4 before 22.4R3-S6-EVO, <br /> * from 23.2 before 23.2R2-S3-EVO, <br /> * from 23.4 before 23.4R2-S4-EVO, <br /> * from 24.2 before 24.2R2-EVO.<br /> <br /> <br /> <br /> <br /> .
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30649

Publication date:
09/04/2025
An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs.<br /> <br /> Continued receipt and processing of these specific packets will sustain the DoS condition.<br /> <br /> This issue affects Junos OS: * All versions before 22.2R3-S6,<br /> * from 22.4 before 22.4R3-S4,<br /> * from 23.2 before 23.2R2-S3,<br /> * from 23.4 before 23.4R2-S4,<br /> * from 24.2 before 24.2R1-S2, 24.2R2<br /> <br /> <br /> An indicator of compromise will indicate the SPC3 SPUs utilization has spiked.<br /> <br /> <br /> For example: <br />    user@device&gt; show services service-sets summary<br /> Service sets CPU<br /> Interface configured Bytes used Session bytes used Policy bytes used utilization<br /> "interface" 1 "bytes" (percent%) "sessions" ("percent"%) "bytes" ("percent"%) 99.97 % OVLD
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30651

Publication date:
09/04/2025
A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).<br /> When an attacker sends a specific ICMPv6 packet to an interface with "protocols router-advertisement" configured, rpd crashes and restarts. Continued receipt of this packet will cause a sustained DoS condition. <br /> <br /> <br /> <br /> <br /> This issue only affects systems configured with IPv6.<br /> <br /> <br /> <br /> This issue affects Junos OS: <br /> <br /> <br /> * All versions before 21.2R3-S9, <br /> * from 21.4 before 21.4R3-S10, <br /> * from 22.2 before 22.2R3-S6, <br /> * from 22.4 before 22.4R3-S4, <br /> * from 23.2 before 23.2R2-S2, <br /> * from 23.4 before 23.4R2; <br /> <br /> <br /> <br /> and Junos OS Evolved: <br /> * All versions before 21.2R3-S9-EVO, <br /> * from 21.4-EVO before 21.4R3-S10-EVO, <br /> * from 22.2-EVO before 22.2R3-S6-EVO, <br /> * from 22.4-EVO before 22.4R3-S4-EVO, <br /> * from 23.2-EVO before 23.2R2-S2-EVO, <br /> * from 23.4-EVO before 23.4R2-EVO.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30652

Publication date:
09/04/2025
An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS).<br /> <br /> When asregex-optimized is configured and a specific "show route as-path" CLI command is executed, the rpd crashes and restarts. Repeated execution of this command will cause a sustained DoS condition.<br /> This issue affects Junos OS: <br /> <br /> <br /> * All versions before 21.2R3-S9, <br /> * from 21.4 before 21.4R3-S10, <br /> * from 22.2 before 22.2R3-S6, <br /> * from 22.4 before 22.4R3-S6, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S4, <br /> * from 24.2 before 24.2R2.<br /> <br /> <br /> <br /> and Junos OS Evolved: <br /> * All versions before 21.2R3-S9-EVO, <br /> * from 21.4-EVO before 21.4R3-S10-EVO, <br /> * from 22.2-EVO before 22.2R3-S6-EVO, <br /> * from 22.4-EVO before 22.4R3-S6-EVO, <br /> * from 23.2-EVO before 23.2R2-S3-EVO, <br /> * from 23.4-EVO before 23.4R2-S4-EVO, <br /> * from 24.2-EVO before 24.2R2-EVO.
Severity CVSS v4.0: MEDIUM
Last modification:
11/04/2025

CVE-2025-2631

Publication date:
09/04/2025
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-2632

Publication date:
09/04/2025
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30644

Publication date:
09/04/2025
A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series allows an attacker to send a specific DHCP packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.<br /> <br /> Under a rare timing scenario outside the attacker&amp;#39;s control, memory corruption may be observed when DHCP Option 82 is enabled, leading to an FPC crash and affecting packet forwarding. Due to the nature of the heap-based overflow, exploitation of this vulnerability could also lead to remote code execution within the FPC, resulting in complete control of the vulnerable component.<br /> This issue affects Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series: <br /> <br /> <br /> <br /> <br /> * All versions before 21.4R3-S9, <br /> * from 22.2 before 22.2R3-S5, <br /> * from 22.4 before 22.4R3-S5, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2-S3, <br /> * from 24.2 before 24.2R2.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025

CVE-2025-30645

Publication date:
09/04/2025
A NULL Pointer Dereference vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker causing specific, valid control traffic to be sent out of a Dual-Stack (DS) Lite tunnel to crash the flowd process, resulting in a Denial of Service (DoS).  Continuous triggering of specific control traffic will create a sustained Denial of Service (DoS) condition.<br /> <br /> On all SRX platforms, when specific, valid control traffic needs to be sent out of a DS-Lite tunnel, a segmentation fault occurs within the flowd process, resulting in a network outage until the flowd process restarts.<br /> <br /> This issue affects Junos OS on SRX Series: <br /> * All versions before 21.2R3-S9, <br /> * from 21.4 before 21.4R3-S9, <br /> * from 22.2 before 22.2R3-S5, <br /> * from 22.4 before 22.4R3-S6, <br /> * from 23.2 before 23.2R2-S3, <br /> * from 23.4 before 23.4R2.
Severity CVSS v4.0: HIGH
Last modification:
11/04/2025