Impact
An incorrect permission assignment in the On‑Box Anomaly detection framework allows an unauthenticated, network‑based attacker to access a service that should be reachable only by internal processes. Because the service is enabled by default, an attacker can manipulate it to execute arbitrary code with root privileges, effectively taking full control of the device.
Affected Systems
The vulnerability affects Juniper Networks Junos OS Evolved on PTX Series devices, specifically the PTX models listed in the CPE data (PTX10001-36mr, PTX10002-36qdd, PTX10003, PTX10004, PTX10008, PTX10016). Versions 25.4 earlier than 25.4R1‑S1‑EVO and 25.4R2‑EVO are impacted; later releases and versions before 25.4R1‑EVO are not.
Risk and Exploitability
The CVSS score is 9.3, indicating critical severity. EPSS is reported as less than 1%, implying a very low but non‑zero probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Given the network‑based attack vector and the fact that the service is widely exposed by default, the risk of exploitation remains high until a patch is applied.
OpenCVE Enrichment