Juniper Networks Releases Out-of-Cycle Security Bulletin for Critical Vulnerability
API authentication bypass vulnerability CVE-2025-21589 affects Session Smart Router, Conductor, and WAN Assurance Managed Routers
Summary
API authentication bypass vulnerability CVE-2025-21589 affects Session Smart Router, Conductor, and WAN Assurance Managed Routers
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Juniper Networks has released an out-of-cycle security update addressing one critical API authentication bypass using an alternate path or channel vulnerability, which has a CVSSv4 score of 9.3. Exploitation of the vulnerability could allow a network-based attacker to bypass authentication and take administrative control of the device.
Remediation advice
Affected organisations are encouraged to review Juniper Networks out-of-cycle security bulletin: "Session Smart Router, Session Smart Conductor, WAN Assurance Router: API Authentication Bypass Vulnerability (CVE-2025-21589)" Article ID JSA94663 and apply any relevant security updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 19 February 2025 1:00 pm