CVE-2025-60010

Oct. 9, 2025, 5:16 p.m.

5.3
Medium

Description

A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change. Affected devices allow logins by users for whom the RADIUS server has responded with a reject and required the user to change the password as their password was expired. Therefore the policy mandating the password change is not enforced. This does not allow users to login with a wrong password, but only with the correct but expired one. This issue affects: Junos OS:  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S4, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S1, * 24.4 versions before 24.4R1-S3, 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S4-EVO, * 23.4 versions before 23.4R2-S5-EVO, * 24.2 versions before 24.2R2-S1-EVO, * 24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO.

Product(s) Impacted

Vendor Product Versions
Juniper
  • Junos Os
  • Junos Os Evolved
  • <22.4R3-S8, 23.2, 23.4, 24.2, 24.4
  • <22.4R3-S8-EVO, 23.2, 23.4, 24.2, 24.4

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-262
Not Using Password Aging
The product does not have a mechanism in place for managing password aging.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a juniper junos_os <22.4R3-S8 / / / / / / /
a juniper junos_os 23.2 <23.2R2-S4 / / / / / /
a juniper junos_os 23.4 <23.4R2-S5 / / / / / /
a juniper junos_os 24.2 <24.2R2-S1 / / / / / /
a juniper junos_os 24.4 <24.4R1-S3 / / / / / /
a juniper junos_os_evolved <22.4R3-S8-EVO / / / / / / /
a juniper junos_os_evolved 23.2 <23.2R2-S4-EVO / / / / / /
a juniper junos_os_evolved 23.4 <23.4R2-S5-EVO / / / / / /
a juniper junos_os_evolved 24.2 <24.2R2-S1-EVO / / / / / /
a juniper junos_os_evolved 24.4 <24.4R1-S3-EVO / / / / / /
a juniper junos_os_evolved 24.4 24.4R2-EVO / / / / / /

CVSS Score

5.3 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: NONE
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: LOW
  • Integrity Impact: LOW
  • Availability Impact: NONE
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:M/U:X

    View Vector String

Timeline

Published: Oct. 9, 2025, 5:16 p.m.
Last Modified: Oct. 9, 2025, 5:16 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

sirt@juniper.net

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.