Juniper Session Smart routers have a critical flaw, so patch now




  • Juniper Networks says it found a critical flaw during internal testing
  • Session Smart routers bug has a 9.8 severity score and allows full device takeover
  • A patch is already available, so update now

Juniper Networks just released a patch for a critical vulnerability that allowed threat actors to take over Session Smart Routers (SSR).

In a security advisory, the company said that during internal testing, it discovered CVE-2025-21589, an authentication bypass vulnerability with a severity score of 9.8/10 (critical). This issue affects Session Smart Router, Session Smart Conductor, and WAN Assurance Managed Router – the affected endpoints include:

https://cdn.mos.cms.futurecdn.net/pQX7vZftvp4kjZhuJkt7yR-1200-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img