2025-10 Security Bulletin: Junos Space: Multiple XSS vulnerabilities resolved in 24.1R4 release Juniper Security Advisories 13 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS: When a user with the name ftp or anonymous is configured unauthenticated filesystem access is allowed (CVE-2025-59980) Juniper Security Advisories 9 October 2025 at 20:00
2025-10 Security Bulletin: Junos Space: Arbitrary file download vulnerability in web interface (CVE-2025-59976) Juniper Security Advisories 8 October 2025 at 20:00
2025-10 Security Bulletin: Junos Space Security Director: Multiple vulnerabilities resolved in 24.1R4 Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos Space: Multiple XSS vulnerabilities resolved in 24.1R4 release Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server (CVE-2025-11198) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos Space: Flooding device with inbound API calls leads to WebUI and CLI management access DoS (CVE-2025-59975) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos Space: Reflected client-side HTTP parameter pollution vulnerability in web interface (CVE-2025-59977) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos Space: Arbitrary file download vulnerability in web interface (CVE-2025-59976) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS and Junos OS Evolved: Device allows login for user with expired password (CVE-2025-60010) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS: When a user with the name ftp or anonymous is configured unauthenticated filesystem access is allowed (CVE-2025-59980) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS and Junos OS Evolved: Specific BGP EVPN update message causes rpd crash (CVE-2025-60004) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS Evolved: Multiple OS command injection vulnerabilities fixed (CVE-2025-60006) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Juniper Security Director: Insufficient authorization for sensitive resources in web interface (CVE-2025-59968) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS Evolved: ACX7024, ACX7024X, ACX7100-32C, ACX7100-48L, ACX7348, ACX7509: When specific valid multicast traffic is received on the L3 interface on a vulnerable device evo-pfemand crashes and restarts (CVE-2025-59967) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS: SRX4700: When forwarding-options sampling is enabled any traffic destined to the RE will cause the forwarding line card to crash and restart (CVE-2025-59964) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS and Junos OS Evolved: With BGP sharding enabled, change in indirect next-hop can cause RPD crash (CVE-2025-59962) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS Evolved: PTX Series: When firewall filter rejects traffic these packets are erroneously sent to the RE (CVE-2025-59958) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS: EX4600 Series and QFX5000 Series: An attacker with physical access can open a persistent backdoor (CVE-2025-59957) Juniper Security Advisories 7 October 2025 at 20:00
2025-10 Security Bulletin: Junos OS Evolved: PTX Series except PTX10003: An unauthenticated adjacent attacker sending specific valid traffic can cause a memory leak in cfmman leading to FPC crash and restart (CVE-2025-52961) Juniper Security Advisories 7 October 2025 at 20:00