CVE Vulnerabilities

CVE-2025-52982

Improper Resource Shutdown or Release

Published: Jul 11, 2025 | Modified: Jan 23, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

When an MX Series device with an MS-MPC is configured with two or more service sets which are both processing SIP calls, a specific sequence of call events will lead to a crash and restart of the MS-MPC. This issue affects Junos OS:

  • all versions before 21.2R3-S9,
  • 21.4 versions from 21.4R1,
  • 22.2 versions before 22.2R3-S6,
  • 22.4 versions before 22.4R3-S6.

As the MS-MPC is EoL after Junos OS 22.4, later versions are not affected.

This issue does not affect MX-SPC3 or SRX Series devices.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
JunosJuniper*21.2 (excluding)
JunosJuniper21.2 (including)21.2 (including)
JunosJuniper21.2-r1 (including)21.2-r1 (including)
JunosJuniper21.2-r1-s1 (including)21.2-r1-s1 (including)
JunosJuniper21.2-r1-s2 (including)21.2-r1-s2 (including)
JunosJuniper21.2-r2 (including)21.2-r2 (including)
JunosJuniper21.2-r2-s1 (including)21.2-r2-s1 (including)
JunosJuniper21.2-r2-s2 (including)21.2-r2-s2 (including)
JunosJuniper21.2-r3 (including)21.2-r3 (including)
JunosJuniper21.2-r3-s1 (including)21.2-r3-s1 (including)
JunosJuniper21.2-r3-s2 (including)21.2-r3-s2 (including)
JunosJuniper21.2-r3-s3 (including)21.2-r3-s3 (including)
JunosJuniper21.2-r3-s4 (including)21.2-r3-s4 (including)
JunosJuniper21.2-r3-s5 (including)21.2-r3-s5 (including)
JunosJuniper21.2-r3-s6 (including)21.2-r3-s6 (including)
JunosJuniper21.2-r3-s7 (including)21.2-r3-s7 (including)
JunosJuniper21.2-r3-s8 (including)21.2-r3-s8 (including)
JunosJuniper21.4-r1 (including)21.4-r1 (including)
JunosJuniper21.4-r1-s1 (including)21.4-r1-s1 (including)
JunosJuniper21.4-r1-s2 (including)21.4-r1-s2 (including)
JunosJuniper21.4-r2 (including)21.4-r2 (including)
JunosJuniper21.4-r2-s1 (including)21.4-r2-s1 (including)
JunosJuniper21.4-r2-s2 (including)21.4-r2-s2 (including)
JunosJuniper21.4-r3 (including)21.4-r3 (including)
JunosJuniper21.4-r3-s1 (including)21.4-r3-s1 (including)
JunosJuniper21.4-r3-s10 (including)21.4-r3-s10 (including)
JunosJuniper21.4-r3-s11 (including)21.4-r3-s11 (including)
JunosJuniper21.4-r3-s12 (including)21.4-r3-s12 (including)
JunosJuniper21.4-r3-s2 (including)21.4-r3-s2 (including)
JunosJuniper21.4-r3-s3 (including)21.4-r3-s3 (including)
JunosJuniper21.4-r3-s4 (including)21.4-r3-s4 (including)
JunosJuniper21.4-r3-s5 (including)21.4-r3-s5 (including)
JunosJuniper21.4-r3-s6 (including)21.4-r3-s6 (including)
JunosJuniper21.4-r3-s7 (including)21.4-r3-s7 (including)
JunosJuniper21.4-r3-s8 (including)21.4-r3-s8 (including)
JunosJuniper21.4-r3-s9 (including)21.4-r3-s9 (including)
JunosJuniper22.2 (including)22.2 (including)
JunosJuniper22.2-r1 (including)22.2-r1 (including)
JunosJuniper22.2-r1-s1 (including)22.2-r1-s1 (including)
JunosJuniper22.2-r1-s2 (including)22.2-r1-s2 (including)
JunosJuniper22.2-r2 (including)22.2-r2 (including)
JunosJuniper22.2-r2-s1 (including)22.2-r2-s1 (including)
JunosJuniper22.2-r2-s2 (including)22.2-r2-s2 (including)
JunosJuniper22.2-r3 (including)22.2-r3 (including)
JunosJuniper22.2-r3-s1 (including)22.2-r3-s1 (including)
JunosJuniper22.2-r3-s2 (including)22.2-r3-s2 (including)
JunosJuniper22.2-r3-s3 (including)22.2-r3-s3 (including)
JunosJuniper22.2-r3-s4 (including)22.2-r3-s4 (including)
JunosJuniper22.2-r3-s5 (including)22.2-r3-s5 (including)

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References