If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one.
This issue affects Security Director Policy Enforcer:
* All versions before 23.1R1 Hotpatch v3.
This issue does not affect Junos Space Security Director Insights.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Security Director Policy Enforcer 23.1 Hotpatch v3, 24.1R4, and all subsequent releases. Additionally, Juniper SIRT suggests action taken to rotate secrets across all devices after upgrading.
Workaround
There are no known workarounds for this issue. To reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted users, hosts and networks.
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA103437 |
|
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos Juniper space Security Director |
|
| Vendors & Products |
Juniper
Juniper junos Juniper space Security Director |
Thu, 09 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Missing Authentication for Critical Function vulnerability in Juniper Networks Security Director Policy Enforcer allows an unauthenticated, network-based attacker to replace legitimate vSRX images with malicious ones. If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one. This issue affects Security Director Policy Enforcer: * All versions before 23.1R1 Hotpatch v3. This issue does not affect Junos Space Security Director Insights. | |
| Title | Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-09T19:49:45.941Z
Reserved: 2025-09-30T19:04:32.768Z
Link: CVE-2025-11198
Updated: 2025-10-09T19:43:36.293Z
Status : Awaiting Analysis
Published: 2025-10-09T16:15:44.270
Modified: 2025-10-14T19:37:28.107
Link: CVE-2025-11198
No data.
OpenCVE Enrichment
Updated: 2025-10-10T11:17:46Z