Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Juniper Networks Patches Critical Junos Space Vulnerabilities

Juniper Networks Patches Critical Junos Space Vulnerabilities

Posted on October 10, 2025October 10, 2025 By CWS

Juniper Networks has introduced patches for practically 220 vulnerabilities in Junos OS, Junos Area, and Safety Director, together with 9 critical-severity flaws affecting Junos Area.

Greater than 200 safety defects had been resolved in Junos Area and Junos Area Safety Director, Juniper’s October 2025 safety advisories, revealed as a part of the corporate’s predefined quarterly schedule, reveal.

Junos Area model 24.1R4 was rolled out with fixes for twenty-four cross-site scripting (XSS) points, together with a critical-severity bug (CVE-2025-59978, CVSS rating of 9.0) that might enable attackers to retailer script tags in textual content pages and execute instructions on a customer’s system with administrative privileges.

Junos Area 24.1R4 Patch V1 was launched with fixes for 162 distinctive CVEs, together with 9 critical-severity flaws: CVE-2019-12900, CVE-2023-38408, CVE-2024-3596, CVE-2024-27280, CVE-2024-35845, CVE-2024-47538, CVE-2024-47607, and CVE-2024-47615.

Juniper additionally resolved a high-severity denial-of-service (DoS) vulnerability and medium-severity arbitrary file obtain and HTTP parameter air pollution bugs in Junos Area.

Moreover, the corporate introduced fixes for 3 high-severity and 15 medium-severity Junos Area Safety Director flaws, and for a high-severity bug in Safety Director Coverage Enforcer.

Junos OS and Junos OS Advanced updates resolved two high-severity DoS safety defects, in addition to medium-severity points that might enable attackers to entry delicate info, get hold of read-write entry to information, trigger DoS circumstances, elevate privileges and/or execute unauthorized instructions, create a backdoor, or bypass a required password change.

Juniper says it’s not conscious of any of those vulnerabilities being exploited within the wild, however customers are suggested to use the patches as quickly as doable, as there are not any workarounds for many of those points.Commercial. Scroll to proceed studying.

Extra info on the resolved vulnerabilities may be discovered on Juniper’s help portal.

Associated: Vulnerabilities Patched by Juniper, VMware and Zoom

Associated: Juniper Networks Patches Dozens of Junos Vulnerabilities

Associated: Unauthenticated RCE Flaw Patched in DrayTek Routers

Associated: Important Vulnerability Places 60,000 Redis Servers at Danger of Exploitation

Security Week News Tags:Critical, Juniper, Junos, Networks, Patches, Space, Vulnerabilities

Post navigation

Previous Post: ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities
Next Post: 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

Related Posts

Four-Year Prison Sentence for PowerSchool Hacker Four-Year Prison Sentence for PowerSchool Hacker Security Week News
Nearly 250,000 Impacted by Data Breach at Medical Associates of Brevard  Nearly 250,000 Impacted by Data Breach at Medical Associates of Brevard  Security Week News
SentinelOne to Acquire Observo AI in 5 Million Deal SentinelOne to Acquire Observo AI in $225 Million Deal Security Week News
Encryption Backdoors: The Security Practitioners’ View Encryption Backdoors: The Security Practitioners’ View Security Week News
Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week Security Week News
Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark