Tampering with this metadata can result in managed SRX Series devices permitting network traffic that should otherwise be blocked by policy, effectively bypassing intended security controls.
This issue affects Junos Space Security Director
* all versions prior to 24.1R3 Patch V4
This issue does not affect managed cSRX Series devices.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Junos Space Security Director: 24.1R3 Patch V4, 24.1R4 and all subsequent releases.
Workaround
There are no known workarounds for this issue. To reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted users, hosts and networks.
Thu, 09 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Missing Authorization vulnerability in the Juniper Networks Junos Space Security Director allows an unauthenticated network-based attacker to read or modify metadata via the web interface. Tampering with this metadata can result in managed SRX Series devices permitting network traffic that should otherwise be blocked by policy, effectively bypassing intended security controls. This issue affects Junos Space Security Director * all versions prior to 24.1R3 Patch V4 This issue does not affect managed cSRX Series devices. | |
Title | Junos Space Security Director: Insufficient authorization for sensitive resources in web interface | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-09T16:03:31.610Z
Reserved: 2025-09-23T18:19:06.955Z
Link: CVE-2025-59968

Updated: 2025-10-09T16:03:16.938Z

Status : Received
Published: 2025-10-09T16:15:46.837
Modified: 2025-10-09T16:15:46.837
Link: CVE-2025-59968

No data.

No data.