Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Juniper Networks Patches Critical Junos Space Vulnerabilities

Posted on October 10, 2025October 10, 2025 By CWS

Juniper Networks has introduced patches for practically 220 vulnerabilities in Junos OS, Junos Area, and Safety Director, together with 9 critical-severity flaws affecting Junos Area.

Greater than 200 safety defects had been resolved in Junos Area and Junos Area Safety Director, Juniper’s October 2025 safety advisories, revealed as a part of the corporate’s predefined quarterly schedule, reveal.

Junos Area model 24.1R4 was rolled out with fixes for twenty-four cross-site scripting (XSS) points, together with a critical-severity bug (CVE-2025-59978, CVSS rating of 9.0) that might enable attackers to retailer script tags in textual content pages and execute instructions on a customer’s system with administrative privileges.

Junos Area 24.1R4 Patch V1 was launched with fixes for 162 distinctive CVEs, together with 9 critical-severity flaws: CVE-2019-12900, CVE-2023-38408, CVE-2024-3596, CVE-2024-27280, CVE-2024-35845, CVE-2024-47538, CVE-2024-47607, and CVE-2024-47615.

Juniper additionally resolved a high-severity denial-of-service (DoS) vulnerability and medium-severity arbitrary file obtain and HTTP parameter air pollution bugs in Junos Area.

Moreover, the corporate introduced fixes for 3 high-severity and 15 medium-severity Junos Area Safety Director flaws, and for a high-severity bug in Safety Director Coverage Enforcer.

Junos OS and Junos OS Advanced updates resolved two high-severity DoS safety defects, in addition to medium-severity points that might enable attackers to entry delicate info, get hold of read-write entry to information, trigger DoS circumstances, elevate privileges and/or execute unauthorized instructions, create a backdoor, or bypass a required password change.

Juniper says it’s not conscious of any of those vulnerabilities being exploited within the wild, however customers are suggested to use the patches as quickly as doable, as there are not any workarounds for many of those points.Commercial. Scroll to proceed studying.

Extra info on the resolved vulnerabilities may be discovered on Juniper’s help portal.

Associated: Vulnerabilities Patched by Juniper, VMware and Zoom

Associated: Juniper Networks Patches Dozens of Junos Vulnerabilities

Associated: Unauthenticated RCE Flaw Patched in DrayTek Routers

Associated: Important Vulnerability Places 60,000 Redis Servers at Danger of Exploitation

Security Week News Tags:Critical, Juniper, Junos, Networks, Patches, Space, Vulnerabilities

Post navigation

Previous Post: ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities
Next Post: 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

Related Posts

VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched Security Week News
Zoomcar Says Hackers Accessed Data of 8.4 Million Users Security Week News
Qantas Data Breach Impacts Up to 6 Million Customers  Security Week News
Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems Security Week News
RapperBot Botnet Disrupted, American Administrator Indicted Security Week News
Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News