Juniper patched nine critical flaws in Junos Space


Juniper patched nine critical flaws in Junos Space

Pierluigi Paganini
October 10, 2025

Juniper fixed nearly 220 flaws in Junos OS, Junos Space, and Security Director, including nine critical bugs in Junos Space.

Juniper Networks released patches to address nearly 220 vulnerabilities in Junos OS, Junos Space, and Security Director, including nine critical flaws in Junos Space.

Junos Space 24.1R4 Patch V1 fixes 162 vulnerabilities, including nine critical flaws and 24 cross-site scripting (XSS) bugs.

One of these flaws, tracked as CVE-2025-59978 (CVSS score of 9.0), is a critical Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos Space. It occurs due to improper neutralization of input during web page generation, allowing attackers to embed malicious script tags directly into web pages. When another user views these pages, the scripts execute with the victim’s administrative privileges, potentially allowing full control of the system. This flaw affects all Junos Space versions prior to 24.1R4, which includes the patch.

This type of vulnerability is particularly dangerous in administrative interfaces because it can lead to unauthorized configuration changes, data theft, or further network compromise.

Junos Space 24.1R4 Patch V1 resolved 162 vulnerabilities, including nine critical issue. The two most severe vulnerabilities are:

  • CVE-2025-59978 (CVSS score of 9.0): A cross-site scripting in Juniper Junos Space lets attackers inject script tags into web pages; when viewed these run with the viewer’s administrative privileges, enabling command execution and potential full system compromise. Affects versions before 24.1R4.
  • CVE-2024-47615 (CVSS score of 8.6): A GStreamer OOB-write in gst_parse_vorbis_setup_packet lets an attacker overwrite up to 380 bytes of memory due to unchecked input array size. Fixed in 1.24.10.

Juniper is not aware of any attacks in the wild exploiting these vulnerabilities, however, it recommends users to apply the patches as soon as possible.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Junos Space)







Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.