Security News > 2025 > February > Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

2025-02-18 12:18
Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. "An Authentication Bypass Using an Alternate Path or
News URL
https://thehackernews.com/2025/02/juniper-session-smart-routers.html
Related news
- Juniper patches critical auth bypass in Session Smart routers (source)
- Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches (source)
- Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software (source)
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108) (source)
- Hackers exploit authentication bypass in Palo Alto Networks PAN-OS (source)
- Chinese cyberspies backdoor Juniper routers for stealthy access (source)
- Expired Juniper routers find new life – as Chinese spy hubs (source)
- Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits (source)
- GitLab patches critical authentication bypass vulnerabilities (source)
- Juniper patches bug that let Chinese cyberspies backdoor routers (source)