A Missing Authorization vulnerability in Juniper Networks Security Director allows an unauthenticated network-based attacker to read or tamper with multiple sensitive resources via the web interface.

Numerous endpoints on the Juniper Security Director appliance do not validate authorization and will deliver information to the caller that is outside their authorization level. An attacker can access data that is outside the user's authorization level. The information obtained can be used to gain access to additional information or perpetrate other attacks, impacting downstream managed devices.



This issue affects Security Director version 24.4.1.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: Juniper Security Director Software Bundle Update 24.4.1-1703, and all subsequent releases


Workaround

Use access lists or firewall filters to limit access to the web interface only from trusted hosts.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00036}


Fri, 11 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description A Missing Authorization vulnerability in Juniper Networks Security Director allows an unauthenticated network-based attacker to read or tamper with multiple sensitive resources via the web interface. Numerous endpoints on the Juniper Security Director appliance do not validate authorization and will deliver information to the caller that is outside their authorization level. An attacker can access data that is outside the user's authorization level. The information obtained can be used to gain access to additional information or perpetrate other attacks, impacting downstream managed devices. This issue affects Security Director version 24.4.1.
Title Juniper Security Director: Insufficient authorization for multiple endpoints in web interface
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H'}

cvssV4_0

{'score': 6.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2025-07-12T03:55:12.120Z

Reserved: 2025-06-23T13:16:01.409Z

Link: CVE-2025-52950

cve-icon Vulnrichment

Updated: 2025-07-11T14:57:00.524Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-11T15:15:25.570

Modified: 2025-07-15T13:14:49.980

Link: CVE-2025-52950

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.