We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6549

Junos OS: SRX Series: J-Web can be exposed on additional interfaces



Description

An Incorrect Authorization vulnerability in the web server of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to reach the Juniper Web Device Manager (J-Web). When Juniper Secure connect (JSC) is enabled on specific interfaces, or multiple interfaces are configured for J-Web, the J-Web UI is reachable over more than the intended interfaces. This issue affects Junos OS: * all versions before 21.4R3-S9, * 22.2 versions before 22.2R3-S5, * 22.4 versions before 22.4R3-S5, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2.

Reserved 2025-06-23 | Published 2025-07-11 | Updated 2025-07-11 | Assigner juniper


MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:Y/R:U/RE:M

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

Any version before 21.4R3-S9
affected

22.2 before 22.2R3-S5
affected

22.4 before 22.4R3-S5
affected

23.2 before 23.2R2-S3
affected

23.4 before 23.4R2-S5
affected

24.2 before 24.2R2
affected

References

supportportal.juniper.net/JSA100098 vendor-advisory

cve.org (CVE-2025-6549)

nvd.nist.gov (CVE-2025-6549)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6549

Support options

Helpdesk Chat, Email, Knowledgebase