CVE-2025-6549
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-07-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | juniper_junos | 23.4R2 |
| juniper | juniper_junos | 24.2R2 |
| juniper | juniper_junos | 22.4R3 |
| juniper | juniper_junos | 21.4R3 |
| juniper | juniper_junos | 22.2R3 |
| juniper | juniper_junos | 23.2R2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Incorrect Authorization issue in the web server of Juniper Networks Junos OS on SRX Series devices. It allows an unauthenticated, network-based attacker to access the Juniper Web Device Manager (J-Web) interface over more network interfaces than intended when Juniper Secure Connect (JSC) is enabled on specific interfaces or when multiple interfaces are configured for J-Web.
How can this vulnerability impact me? :
The vulnerability can allow an unauthenticated attacker to reach the J-Web interface from unintended network interfaces, potentially exposing device management functions to unauthorized users. This could lead to unauthorized access to device configuration or management, increasing the risk of compromise or misuse of the affected network device.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade your Junos OS on SRX Series devices to a fixed version. Specifically, update to versions 21.4R3-S9 or later, 22.2R3-S5 or later, 22.4R3-S5 or later, 23.2R2-S3 or later, 23.4R2-S5 or later, or 24.2R2 or later, depending on your current version. Additionally, review and restrict the interfaces on which Juniper Secure Connect (JSC) and J-Web are enabled to ensure the J-Web UI is only reachable on intended interfaces.