Tech

Juniper Session Smart routers have a critical flaw, so patch now

Share
Share


  • Juniper Networks says it found a critical flaw during internal testing
  • Session Smart routers bug has a 9.8 severity score and allows full device takeover
  • A patch is already available, so update now

Juniper Networks just released a patch for a critical vulnerability that allowed threat actors to take over Session Smart Routers (SSR).

In a security advisory, the company said that during internal testing, it discovered CVE-2025-21589, an authentication bypass vulnerability with a severity score of 9.8/10 (critical). This issue affects Session Smart Router, Session Smart Conductor, and WAN Assurance Managed Router – the affected endpoints include:

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles