More

    Juniper Session Smart routers have a critical flaw, so patch now




    • Juniper Networks says it found a critical flaw during internal testing
    • Session Smart routers bug has a 9.8 severity score and allows full device takeover
    • A patch is already available, so update now

    Juniper Networks just released a patch for a critical vulnerability that allowed threat actors to take over Session Smart Routers (SSR).

    In a security advisory, the company said that during internal testing, it discovered CVE-2025-21589, an authentication bypass vulnerability with a severity score of 9.8/10 (critical). This issue affects Session Smart Router, Session Smart Conductor, and WAN Assurance Managed Router – the affected endpoints include:

    https://cdn.mos.cms.futurecdn.net/pQX7vZftvp4kjZhuJkt7yR-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img