CVE-2025-21589

CRITICAL

Juniper Networks Session Smart Router <5.6.17-6.1.12-lts-6.2.8-lts-...

Title source: llm
STIX 2.1

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allows a network-based attacker to bypass authentication and take administrative control of the device. This issue affects Session Smart Router:  * from 5.6.7 before 5.6.17,  * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts,  * from 6.2 before 6.2.8-lts,  * from 6.3 before 6.3.3-r2;  This issue affects Session Smart Conductor:  * from 5.6.7 before 5.6.17,  * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts,  * from 6.2 before 6.2.8-lts,  * from 6.3 before 6.3.3-r2;  This issue affects WAN Assurance Managed Routers:  * from 5.6.7 before 5.6.17,  * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts,  * from 6.2 before 6.2.8-lts,  * from 6.3 before 6.3.3-r2.

Scores

CVSS v3 9.8
EPSS 0.0004
EPSS Percentile 12.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-288
Status published
Products (15)
Juniper Networks/Session Smart Conductor 5.6.7 - 5.6.17
Juniper Networks/Session Smart Conductor 6.0 - 6.0.8
Juniper Networks/Session Smart Conductor 6.1 - 6.1.12-lts
Juniper Networks/Session Smart Conductor 6.2 - 6.2.8-lts
Juniper Networks/Session Smart Conductor 6.3 - 6.3.3-r2
Juniper Networks/Session Smart Router 5.6.7 - 5.6.17
Juniper Networks/Session Smart Router 6.0 - 6.0.8
Juniper Networks/Session Smart Router 6.1 - 6.1.12-lts
Juniper Networks/Session Smart Router 6.2 - 6.2.8-lts
Juniper Networks/Session Smart Router 6.3 - 6.3.3-r2
... and 5 more
Published Jan 27, 2026
Tracked Since Feb 18, 2026