CVE-2025-60010: CWE-262 Not Using Password Aging in Juniper Networks Junos OS
A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change. Affected devices allow logins by users for whom the RADIUS server has responded with a reject and required the user to change the password as their password was expired. Therefore the policy mandating the password change is not enforced. This does not allow users to login with a wrong password, but only with the correct but expired one. This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S4, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S1, * 24.4 versions before 24.4R1-S3, 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S4-EVO, * 23.4 versions before 23.4R2-S5-EVO, * 24.2 versions before 24.2R2-S1-EVO, * 24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO.
AI Analysis
Technical Summary
CVE-2025-60010 is a vulnerability classified under CWE-262 (Not Using Password Aging) affecting Juniper Networks Junos OS and Junos OS Evolved. The flaw exists in the RADIUS client implementation, where the system fails to enforce password expiration policies properly. When a RADIUS server responds with a reject due to an expired password and requires a password change, the Junos device erroneously allows login with the expired but correct password instead of forcing a password update. This means that authenticated users whose passwords have expired can bypass the password aging enforcement and maintain access without updating credentials. The vulnerability affects all versions of Junos OS and Junos OS Evolved before the patched releases 22.4R3-S8, 23.2R2-S4, 23.4R2-S5, 24.2R2-S1, and 24.4R1-S3/24.4R2 and their EVO counterparts. The CVSS 3.1 base score is 5.4 (medium severity), reflecting network attack vector, low complexity, requiring privileges but no user interaction, and limited confidentiality and integrity impact without availability impact. No public exploits are known, but the flaw could be leveraged by an authenticated attacker to maintain unauthorized access, undermining password policy controls and potentially facilitating lateral movement or persistent access within a network environment.
Potential Impact
For European organizations, this vulnerability poses a risk to network device security by allowing authenticated users to bypass password expiration policies, potentially leading to unauthorized prolonged access. This undermines internal security controls designed to enforce credential hygiene and increases the risk of credential compromise or misuse. Confidentiality and integrity of network management sessions could be compromised, enabling attackers to alter configurations or intercept sensitive data. Although availability is not directly impacted, the persistence of expired credentials could facilitate further attacks or unauthorized changes. Organizations in sectors with stringent compliance requirements (e.g., finance, government, critical infrastructure) may face regulatory risks if password policies are not properly enforced. The vulnerability is particularly concerning for large enterprises and service providers relying on Juniper devices for core routing and security functions, as it could be exploited to maintain footholds in critical network infrastructure.
Mitigation Recommendations
European organizations should immediately identify and inventory all Juniper Networks devices running affected Junos OS and Junos OS Evolved versions. They must prioritize applying the vendor-released patches starting from versions 22.4R3-S8 and later as specified. Until patches are applied, organizations should enforce compensating controls such as restricting RADIUS authentication to trusted networks, implementing multi-factor authentication (MFA) for device access, and monitoring authentication logs for anomalous login patterns involving expired credentials. Network segmentation should limit access to management interfaces. Additionally, reviewing and tightening password policies on RADIUS servers and ensuring they are synchronized with device configurations can reduce risk. Regular audits of user accounts and forced password resets can help mitigate the impact. Finally, organizations should update incident response plans to detect and respond to potential misuse of expired credentials.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-60010: CWE-262 Not Using Password Aging in Juniper Networks Junos OS
Description
A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change. Affected devices allow logins by users for whom the RADIUS server has responded with a reject and required the user to change the password as their password was expired. Therefore the policy mandating the password change is not enforced. This does not allow users to login with a wrong password, but only with the correct but expired one. This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S4, * 23.4 versions before 23.4R2-S5, * 24.2 versions before 24.2R2-S1, * 24.4 versions before 24.4R1-S3, 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S4-EVO, * 23.4 versions before 23.4R2-S5-EVO, * 24.2 versions before 24.2R2-S1-EVO, * 24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO.
AI-Powered Analysis
Technical Analysis
CVE-2025-60010 is a vulnerability classified under CWE-262 (Not Using Password Aging) affecting Juniper Networks Junos OS and Junos OS Evolved. The flaw exists in the RADIUS client implementation, where the system fails to enforce password expiration policies properly. When a RADIUS server responds with a reject due to an expired password and requires a password change, the Junos device erroneously allows login with the expired but correct password instead of forcing a password update. This means that authenticated users whose passwords have expired can bypass the password aging enforcement and maintain access without updating credentials. The vulnerability affects all versions of Junos OS and Junos OS Evolved before the patched releases 22.4R3-S8, 23.2R2-S4, 23.4R2-S5, 24.2R2-S1, and 24.4R1-S3/24.4R2 and their EVO counterparts. The CVSS 3.1 base score is 5.4 (medium severity), reflecting network attack vector, low complexity, requiring privileges but no user interaction, and limited confidentiality and integrity impact without availability impact. No public exploits are known, but the flaw could be leveraged by an authenticated attacker to maintain unauthorized access, undermining password policy controls and potentially facilitating lateral movement or persistent access within a network environment.
Potential Impact
For European organizations, this vulnerability poses a risk to network device security by allowing authenticated users to bypass password expiration policies, potentially leading to unauthorized prolonged access. This undermines internal security controls designed to enforce credential hygiene and increases the risk of credential compromise or misuse. Confidentiality and integrity of network management sessions could be compromised, enabling attackers to alter configurations or intercept sensitive data. Although availability is not directly impacted, the persistence of expired credentials could facilitate further attacks or unauthorized changes. Organizations in sectors with stringent compliance requirements (e.g., finance, government, critical infrastructure) may face regulatory risks if password policies are not properly enforced. The vulnerability is particularly concerning for large enterprises and service providers relying on Juniper devices for core routing and security functions, as it could be exploited to maintain footholds in critical network infrastructure.
Mitigation Recommendations
European organizations should immediately identify and inventory all Juniper Networks devices running affected Junos OS and Junos OS Evolved versions. They must prioritize applying the vendor-released patches starting from versions 22.4R3-S8 and later as specified. Until patches are applied, organizations should enforce compensating controls such as restricting RADIUS authentication to trusted networks, implementing multi-factor authentication (MFA) for device access, and monitoring authentication logs for anomalous login patterns involving expired credentials. Network segmentation should limit access to management interfaces. Additionally, reviewing and tightening password policies on RADIUS servers and ensuring they are synchronized with device configurations can reduce risk. Regular audits of user accounts and forced password resets can help mitigate the impact. Finally, organizations should update incident response plans to detect and respond to potential misuse of expired credentials.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2025-09-23T18:19:06.961Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e7e4e6ba0e608b4fa29d2b
Added to database: 10/9/2025, 4:37:58 PM
Last enriched: 10/9/2025, 4:53:15 PM
Last updated: 10/10/2025, 11:15:23 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61864: Use after free in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT
HighCVE-2025-61863: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT
HighCVE-2025-11190: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Synchroweb Kiwire
UnknownCVE-2025-11189: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Synchroweb Kiwire
UnknownCVE-2025-11188: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Synchroweb Kiwire
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.