CVE Vulnerabilities

CVE-2025-21589

Authentication Bypass Using an Alternate Path or Channel

Published: Jan 27, 2026 | Modified: Jan 29, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allows a network-based attacker to bypass authentication and take administrative control of the device.

This issue affects Session Smart Router: 

  • from 5.6.7 before 5.6.17, 

  • from 6.0 before 6.0.8 (affected from 6.0.8),

  • from 6.1 before 6.1.12-lts, 

  • from 6.2 before 6.2.8-lts, 

  • from 6.3 before 6.3.3-r2; 

This issue affects Session Smart Conductor: 

  • from 5.6.7 before 5.6.17, 

  • from 6.0 before 6.0.8 (affected from 6.0.8),

  • from 6.1 before 6.1.12-lts, 

  • from 6.2 before 6.2.8-lts, 

  • from 6.3 before 6.3.3-r2; 

This issue affects WAN Assurance Managed Routers: 

  • from 5.6.7 before 5.6.17, 

  • from 6.0 before 6.0.8 (affected from 6.0.8),

  • from 6.1 before 6.1.12-lts, 

  • from 6.2 before 6.2.8-lts, 

  • from 6.3 before 6.3.3-r2.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Potential Mitigations

References