HomeVulnerabilityJuniper Networks Patches Essential Junos Area Vulnerabilities

Juniper Networks Patches Essential Junos Area Vulnerabilities

Juniper Networks has introduced patches for practically 220 vulnerabilities in Junos OS, Junos Area, and Safety Director, together with 9 critical-severity flaws affecting Junos Area.

Greater than 200 security defects have been resolved in Junos Area and Junos Area Safety Director, Juniper’s October 2025 security advisories, revealed as a part of the corporate’s predefined quarterly schedule, reveal.

Junos Area model 24.1R4 was rolled out with fixes for twenty-four cross-site scripting (XSS) points, together with a critical-severity bug (CVE-2025-59978, CVSS rating of 9.0) that might permit attackers to retailer script tags in textual content pages and execute instructions on a customer’s system with administrative privileges.

Junos Area 24.1R4 Patch V1 was launched with fixes for 162 distinctive CVEs, together with 9 critical-severity flaws: CVE-2019-12900, CVE-2023-38408, CVE-2024-3596, CVE-2024-27280, CVE-2024-35845, CVE-2024-47538, CVE-2024-47607, and CVE-2024-47615.

Juniper additionally resolved a high-severity denial-of-service (DoS) vulnerability and medium-severity arbitrary file obtain and HTTP parameter air pollution bugs in Junos Area.

Moreover, the corporate introduced fixes for 3 high-severity and 15 medium-severity Junos Area Safety Director flaws, and for a high-severity bug in Safety Director Coverage Enforcer.

See also  CSO30 Awards 2025 have a good time Australia’s high cybersecurity leaders

Junos OS and Junos OS Developed updates resolved two high-severity DoS security defects, in addition to medium-severity points that might permit attackers to entry delicate data, receive read-write entry to recordsdata, trigger DoS situations, elevate privileges and/or execute unauthorized instructions, create a backdoor, or bypass a required password change.

Juniper says it isn’t conscious of any of those vulnerabilities being exploited within the wild, however customers are suggested to use the patches as quickly as attainable, as there are not any workarounds for many of those points.

Extra data on the resolved vulnerabilities will be discovered on Juniper’s assist portal.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular