EUVD-2025-21158

| CVE-2025-52950 CRITICAL
2025-07-11 [email protected]
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 16, 2026 - 08:17 euvd
EUVD-2025-21158
Analysis Generated
Mar 16, 2026 - 08:17 vuln.today
CVE Published
Jul 11, 2025 - 15:15 nvd
CRITICAL 9.6

Description

A Missing Authorization vulnerability in Juniper Networks Security Director allows an unauthenticated network-based attacker to read or tamper with multiple sensitive resources via the web interface. Numerous endpoints on the Juniper Security Director appliance do not validate authorization and will deliver information to the caller that is outside their authorization level. An attacker can access data that is outside the user's authorization level. The information obtained can be used to gain access to additional information or perpetrate other attacks, impacting downstream managed devices. This issue affects Security Director version 24.4.1.

Analysis

CVE-2025-52950 is a Missing Authorization vulnerability in Juniper Networks Security Director that allows authenticated attackers to read and modify sensitive resources beyond their authorization level through the web interface. This affects Security Director version 24.4.1 and could enable lateral movement and compromise of downstream managed network devices. The vulnerability has a critical CVSS 9.6 score and represents a significant integrity and availability risk, though it requires valid credentials to exploit.

Technical Context

The vulnerability stems from improper authorization controls (CWE-862: Missing Authorization) in multiple web API endpoints within Juniper Security Director's web interface. The affected product is a centralized management platform for Juniper security appliances (CPE: cpe:2.3:a:juniper:security_director:24.4.1:*:*:*:*:*:*:*). The root cause is a failure to validate that authenticated users possess sufficient privileges before returning or allowing modification of sensitive configuration data, policy information, and device management parameters. This is distinct from authentication bypass—the user must authenticate, but authorization checks are missing on sensitive endpoints. The vulnerability affects the RESTful API endpoints exposed through the web management interface.

Affected Products

Juniper Networks Security Director version 24.4.1 (CPE: cpe:2.3:a:juniper:security_director:24.4.1:*:*:*:*:*:*:*). The vulnerability specifically impacts the web-based management interface and its underlying API endpoints. Organizations should verify whether they are running this specific version; the advisory should clarify whether earlier versions (24.4.0 and prior) or later versions (24.4.2+, 25.x) are affected, but only 24.4.1 is explicitly confirmed vulnerable at this time.

Remediation

1. IMMEDIATE: Restrict network access to the Security Director web management interface to trusted administrative networks using firewall rules or network segmentation. 2. Apply vendor patch when available—monitor Juniper Networks security advisories for Security Director 24.4.x patch release. 3. If patching is delayed, implement strict access controls: limit API access to essential authenticated users, implement strong multi-factor authentication for all management console access, and disable unnecessary API endpoints if possible. 4. Audit all authenticated user accounts and their privilege levels; disable or restrict service accounts and legacy credentials. 5. Monitor web access logs and API audit trails for suspicious authorization-bypassing activity (e.g., low-privileged users accessing admin endpoints). 6. If possible, upgrade to a patched version (Juniper should release 24.4.2+ with fixes or recommend migration to supported versions).

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +48
POC: 0

Share

EUVD-2025-21158 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy