平台
juniper
组件
junos-space
修复版本
24.1R4
CVE-2025-59978 describes a Cross-Site Scripting (XSS) vulnerability within Juniper Networks Junos Space. This vulnerability allows an attacker to inject malicious scripts into web pages, potentially leading to unauthorized command execution with administrative privileges. The vulnerability affects all versions of Junos Space prior to 24.1R4. A fix is available in version 24.1R4.
The impact of this XSS vulnerability is significant. A successful attacker can inject arbitrary JavaScript code into web pages viewed by other Junos Space users, including administrators. This allows the attacker to steal session cookies, hijack user accounts, and ultimately execute commands with the privileges of the compromised user. Given Junos Space's role in network management, a successful exploitation could lead to widespread network disruption or data breaches. The ability to execute commands with administrative privileges significantly expands the attacker's blast radius, potentially impacting the entire managed network.
CVE-2025-59978 was publicly disclosed on 2025-10-09. The vulnerability's CRITICAL CVSS score indicates a high probability of exploitation. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of XSS exploitation suggests that a PoC is likely to emerge. It is not currently listed on CISA KEV.
Organizations heavily reliant on Juniper Junos Space for network management are at significant risk. This includes large enterprises, service providers, and government agencies. Specifically, deployments with older, unpatched versions of Junos Space (prior to 24.1R4) are particularly vulnerable. Shared hosting environments where multiple tenants share a Junos Space instance also face increased risk.
• juniper / server:
grep -r "<script" /opt/junos-space/conf/config.xml• juniper / web:
curl -I https://<junos-space-ip>/ | grep Content-Security-Policy• generic web:
curl -I https://<junos-space-ip>/ | grep X-XSS-Protectiondisclosure
漏洞利用状态
EPSS
0.06% (19% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2025-59978 is to upgrade Junos Space to version 24.1R4 or later. If immediate upgrade is not possible, consider implementing strict input validation and output encoding on all user-supplied data within Junos Space. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regularly review Junos Space configurations for any unusual or unauthorized modifications.
将 Junos Space 更新到 24.1R4 或更高版本。此更新修复了允许攻击者使用目标用户管理权限执行命令的存储型跨站脚本漏洞。有关更多详细信息和升级说明,请参阅 Juniper Networks 安全公告 JSA103140。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-59978 is a critical XSS vulnerability in Juniper Junos Space allowing attackers to inject malicious scripts and potentially gain administrative access.
If you are running Junos Space versions 0–24.1R4, you are affected by this vulnerability. Upgrade to 24.1R4 or later to mitigate the risk.
The recommended fix is to upgrade to Junos Space version 24.1R4 or later. Implement input validation and WAF rules as temporary mitigations.
While no active exploitation has been confirmed, the vulnerability's severity and ease of exploitation suggest a high likelihood of future attacks.
Please refer to the Juniper Security Advisories page for the official advisory regarding CVE-2025-59978: [https://www.juniper.net/us/en/support/security/advisories/]