If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one.
This issue affects Security Director Policy Enforcer:
* All versions before 23.1R1 Hotpatch v3.
This issue does not affect Junos Space Security Director Insights.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Security Director Policy Enforcer 23.1 Hotpatch v3, 24.1R4, and all subsequent releases. Additionally, Juniper SIRT suggests action taken to rotate secrets across all devices after upgrading.
Workaround
There are no known workarounds for this issue. To reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted users, hosts and networks.
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA103437 |
![]() ![]() |
Thu, 09 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Missing Authentication for Critical Function vulnerability in Juniper Networks Security Director Policy Enforcer allows an unauthenticated, network-based attacker to replace legitimate vSRX images with malicious ones. If a trusted user initiates deployment, Security Director Policy Enforcer will deliver the attacker's uploaded image to VMware NSX instead of a legitimate one. This issue affects Security Director Policy Enforcer: * All versions before 23.1R1 Hotpatch v3. This issue does not affect Junos Space Security Director Insights. | |
Title | Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-09T19:49:45.941Z
Reserved: 2025-09-30T19:04:32.768Z
Link: CVE-2025-11198

Updated: 2025-10-09T19:43:36.293Z

Status : Received
Published: 2025-10-09T16:15:44.270
Modified: 2025-10-09T16:15:44.270
Link: CVE-2025-11198

No data.

No data.