CVE Alert: CVE-2025-59968 – Juniper Networks – Junos Space Security Director

CVE-2025-59968

HIGHNo exploitation known

A Missing Authorization vulnerability in the Juniper Networks Junos Space Security Director allows an unauthenticated network-based attacker to read or modify metadata via the web interface.  Tampering with this metadata can result in managed SRX Series devices permitting network traffic that should otherwise be blocked by policy, effectively bypassing intended security controls. This issue affects Junos Space Security Director * all versions prior to 24.1R3 Patch V4 This issue does not affect managed cSRX Series devices.

CVSS v3.1 (8.6)
AV NETWORK · AC LOW · PR NONE · UI NONE · S CHANGED
Vendor
Juniper Networks, Juniper Networks, Juniper Networks
Product
Junos Space Security Director, Junos OS, Junos OS
Versions
0 lt 24.1R3 Patch V4 | 0 | 0
CWE
CWE‑862: Missing Authorization
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Published
2025-10-09T15:48:08.091Z
Updated
2025-10-09T16:03:31.610Z

AI Summary Analysis

Risk verdict

High risk to Junos Space Security Director deployments due to unauthenticated web interface access allowing metadata tampering and potential security-policy bypass; patching is available and should be applied promptly, with urgency if exploitation activity is detected.

Why this matters

Tampering with metadata can cause SRX devices under management to permit traffic that should be blocked, eroding segmentation and policy enforcement. In practice, an attacker could enable firewall evasion, lateral movement, or data exfiltration across networks.

Most likely attack path

Network-based, no privileges or user interaction required. The attacker reads or modifies metadata via the web UI, with changes that can affect multiple managed devices due to the changed scope, enabling cross-device policy bypass.

Who is most exposed

Deployments that expose the management UI to untrusted networks or lack strict ACLs/VPN controls; common in data centres or cloud environments where the director manages many SRX devices.

Detection ideas

  • Metadata read/write activity from unusual or external IPs
  • Changes to metadata that precede anomalous policy allowance
  • Elevated or unexpected access to the web UI without credentials
  • Correlated SRX policy changes and traffic that violates existing rules

Mitigation and prioritisation

  • Apply patches: 24.1R3 Patch V4, 24.1R4 and later
  • Enforce strict access controls: ACLs, VPN-only for the management interface
  • Reduce exposure: limit or disable internet-facing access to the UI where feasible
  • Enable detailed logging and alerting for metadata API activity and policy changes
  • Change-management: plan upgrade, test compatibility, have a rollback path

Note: KEV/EPSS indicators are not provided; if either shows exploitation likelihood, escalate to priority 1.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.