Impact
The vulnerability is an improper verification of the certificate chain used by Junos OS on SRX Series devices when communicating with Security Director. It allows a man‑in‑the‑middle attacker to intercept traffic, steal credentials and other sensitive information, and potentially alter the data in transit. The weakness is classified as CWE‑296.
Affected Systems
All versions of Juniper Networks Junos OS on SRX Series routers that are older than 22.4R3‑S9, 23.2R2‑S6, 23.4R2‑S7, 24.2R2‑S3, 24.4R2‑S2, or 25.2R1‑S2 and 25.2R2 in the 25.2 line are affected.
Risk and Exploitability
The CVSS score of 8.3 indicates high severity. Based on the description, the likely attack vector is a man‑in‑the‑middle positioned between the SRX device and the SD cloud, requiring the attacker to intercept network traffic. No exploit probability data is available and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog, underscoring the need for timely remediation.
OpenCVE Enrichment