Impact
Juniper Networks CTP OS contains a weakness in its password management function. The console interface advertises password complexity requirements that are never saved, allowing administrators to set conditions that do not take effect. This flaw means that local user accounts can be created or changed with passwords that do not meet any strength criteria, leaving them vulnerable to brute‑force or other guessing attacks. An attacker who can reach the device over the network and has no credentials could therefore guess a weak password and gain full administrative access, enabling them to compromise, modify, or delete the device configuration, or use the device as a pivot point for further attacks. The vulnerability is a classic example of poor password policy enforcement (CWE‑521).
Affected Systems
The issue affects Juniper Networks CTP OS versions 9.2R1 and 9.2R2. The vendor has addressed the problem in later releases, namely 9.3R1 and all subsequent builds. No other vendors or product families are listed in the advisory.
Risk and Exploitability
The CVSS score of 9.1 indicates a critical severity with a high likelihood of exploitation. While EPSS data is unavailable, the advisory states the problem can be exploited by an unauthenticated, network‑based attacker, implying that the attack might be launched via standard remote management ports such as SSH or console connections. Although the vulnerability is not listed in the CISA KEV catalog, the presence of an official patch and the high base score emphasize the need for timely mitigation. Until the fix is applied, any device running the affected software can be taken over with relatively little effort if weak passwords are present.
OpenCVE Enrichment