A Missing Authentication for Critical Function vulnerability in Juniper Networks Security Director Policy Enforcer allows an unauthenticated, network-based attacker to replace legitimate vSRX images with malicious ones.



If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one.





This issue affects Security Director Policy Enforcer:  



* All versions before 23.1R1 Hotpatch v3.


This issue does not affect Junos Space Security Director Insights.
Advisories

No advisories yet.

Fixes

Solution

The following software releases have been updated to resolve this specific issue: Security Director Policy Enforcer 23.1 Hotpatch v3, 24.1R4, and all subsequent releases. Additionally, Juniper SIRT suggests action taken to rotate secrets across all devices after upgrading.


Workaround

There are no known workarounds for this issue. To reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted users, hosts and networks.

History

Thu, 09 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Oct 2025 16:00:00 +0000

Type Values Removed Values Added
Description A Missing Authentication for Critical Function vulnerability in Juniper Networks Security Director Policy Enforcer allows an unauthenticated, network-based attacker to replace legitimate vSRX images with malicious ones. If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one. This issue affects Security Director Policy Enforcer:   * All versions before 23.1R1 Hotpatch v3. This issue does not affect Junos Space Security Director Insights.
Title Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/AU:Y/R:U/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2025-10-09T19:49:45.941Z

Reserved: 2025-09-30T19:04:32.768Z

Link: CVE-2025-11198

cve-icon Vulnrichment

Updated: 2025-10-09T19:43:36.293Z

cve-icon NVD

Status : Received

Published: 2025-10-09T16:15:44.270

Modified: 2025-10-09T16:15:44.270

Link: CVE-2025-11198

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.