CVE Alert: CVE-2025-59975 – Juniper Networks – Junos Space

CVE-2025-59975

HIGHNo exploitation known

An Uncontrolled Resource Consumption vulnerability in the HTTP daemon (httpd) of Juniper Networks Junos Space allows an unauthenticated network-based attacker flooding the device with inbound API calls to consume all resources on the system, leading to a Denial of Service (DoS). After continuously flooding the system with inbound connection requests, all available file handles become consumed, blocking access to the system via SSH and the web user interface (WebUI), resulting in a management interface DoS. A manual reboot of the system is required to restore functionality. This issue affects Junos Space: * all versions before 22.2R1 Patch V3, * from 23.1 before 23.1R1 Patch V3.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Juniper Networks
Product
Junos Space
Versions
0 lt 22.2R1 Patch V3 | 23.1 lt 23.1R1 Patch V3
CWE
CWE-400, CWE-400 Uncontrolled Resource Consumption
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-09T15:58:33.416Z
Updated
2025-10-09T19:49:19.097Z

AI Summary Analysis

Risk verdict

High risk of denial-of-service to the device’s management interfaces from an unauthenticated network attacker; patching is urgent if these systems are reachable externally. Exploitation is not currently indicated as active.

Why this matters

An unmanaged DoS at the management surface can take down WebUI and SSH access, hindering monitoring, configuration, and incident response. With no authentication required, a motivated attacker could repeatedly exhaust resources and force a reboot, disrupting network operations and delivery of services.

Most likely attack path

An attacker can flood the httpd API endpoint over the network, consuming all file handles and exhausting resources without any user interaction or credentials. Given a network-facing interface, this can reachable from anywhere on the network and persist until remediation. The high availability impact (A:H) and lack of required privileges increase the likelihood of successful impact if publicly reachable.

Who is most exposed

Organisations using on-prem or hybrid management appliances with exposed HTTP API endpoints are most at risk, especially where management interfaces are publicly reachable or not adequately filtered.

Detection ideas

  • Spike in inbound API requests to management endpoints and abnormal httpd resource usage
  • Rapid CPU/memory consumption and depletion of file handles
  • WebUI/SSH unavailability followed by reboot or service restart events
  • Logs showing repeated, unauthenticated API activity against management interfaces

Mitigation and prioritisation

  • Apply latest patches: 22.2R1 Patch V3, 23.1R1 Patch V3, 24.1R1 or newer
  • Implement strict access controls: ACLs/firewall filters limiting inbound API access to trusted hosts
  • Enable rate limiting and anomaly detection on API endpoints
  • Consider network-level mitigations (WAF, NDR) and reduce attack surface
  • Plan change management to patch in a maintenance window; verify backups and take a baseline after remediation
  • If KEV or EPSS signals existed, escalate to priority 1; in absence of those signals, maintain as high-priority remediation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.