An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Networks Junos OS on MX Series with MPC-BUILTIN, MPC1 through MPC9 line cards allows an unauthenticated adjacent attacker to send a malformed packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS).
Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks:
Junos OS:
* All versions before 22.2R3-S1,
* from 22.4 before 22.4R2.
This feature is not enabled by default.
References
| Link | Resource |
|---|---|
| https://supportportal.juniper.net/JSA100058 | Vendor Advisory |
| https://www.juniper.net/documentation/us/en/software/junos/network-mgmt/topics/topic-map/cfm-configuring.html | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
26 Jan 2026, 18:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Juniper 6x40ge \+ 24x10ge Mpc5eq
Juniper Juniper mpc1e Juniper mx240 Juniper 2x100ge \+ 8x10ge Mpc4e Juniper mpc2e Ng Q Juniper junos Juniper mpc7e-mrate Juniper mpc7e-10g Juniper 2x100ge \+ 4x10ge Mpc5e Juniper mpc8e Juniper mpc6e Juniper mpc3e Juniper mpc9e Juniper mpc3e-3d-ng Juniper mpc2e Ng Juniper 6x40ge \+ 24x10ge Mpc5e Juniper mpc2 Eq Juniper 2x100ge \+ 4x10ge Mpc5eq Juniper mpc1e Q Juniper mpc2 Juniper mpc2e Q Juniper mpc2e P Juniper mpc3e-3d-ng-q Juniper mpc1 Q Juniper mpc2e Eq Juniper mx2020 Juniper 32x10ge Mpc4e Juniper mx2008 Juniper mx960 Juniper mx2010 Juniper mpc1 Juniper mpc2e Juniper mx480 Juniper mpc2 Q |
|
| References | () https://supportportal.juniper.net/JSA100058 - Vendor Advisory | |
| References | () https://www.juniper.net/documentation/us/en/software/junos/network-mgmt/topics/topic-map/cfm-configuring.html - Product | |
| CPE | cpe:2.3:h:juniper:2x100ge_\+_4x10ge_mpc5eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc9e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc3e-3d-ng-q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc7e-10g:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:h:juniper:6x40ge_\+_24x10ge_mpc5eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:6x40ge_\+_24x10ge_mpc5e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc7e-mrate:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc3e-3d-ng:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc3e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:2x100ge_\+_8x10ge_mpc4e:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:h:juniper:mpc8e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:2x100ge_\+_4x10ge_mpc5e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_ng:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_ng_q:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:h:juniper:32x10ge_mpc4e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2_eq:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc6e:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1_q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e_p:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc1e_q:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:h:juniper:mpc2e:-:*:*:*:*:*:*:* |
15 Jul 2025, 13:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
11 Jul 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-11 15:15
Updated : 2026-01-26 18:31
NVD link : CVE-2025-52952
Mitre link : CVE-2025-52952
CVE.ORG link : CVE-2025-52952
JSON object : View
Products Affected
juniper
- mpc6e
- mpc7e-10g
- mpc1
- mpc2e_q
- mpc2e_eq
- mpc2e_p
- mx2008
- mpc3e-3d-ng
- mpc1e
- mpc1e_q
- mpc1_q
- 6x40ge_\+_24x10ge_mpc5eq
- mx2020
- mpc2_eq
- junos
- mpc9e
- mx960
- mpc3e
- mx480
- mpc2e_ng
- mpc3e-3d-ng-q
- mpc8e
- mpc2e
- 2x100ge_\+_4x10ge_mpc5e
- 2x100ge_\+_4x10ge_mpc5eq
- mx2010
- 32x10ge_mpc4e
- mpc2e_ng_q
- mpc2
- 2x100ge_\+_8x10ge_mpc4e
- mpc7e-mrate
- mx240
- mpc2_q
- 6x40ge_\+_24x10ge_mpc5e
CWE
CWE-787
Out-of-bounds Write
