Overview
Juniper Junos OS contains an improper isolation or compartmentalization vulnerability. This vulnerability could allows a local attacker with high privileges to inject arbitrary code.
https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-21590
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-21590 |
| Vendor / Product | Juniper — Junos OS |
| NVD Published | 2025-03-12 |
| NVD Last Modified | 2025-10-24 |
| CVSS 3.1 Score | 4.4 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
| Severity | MEDIUM |
| CWE | CWE-653 |
| CISA KEV Added | 2025-03-13 |
| CISA KEV Deadline | 2025-04-03 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Required Action
CISA BOD 22-01 Deadline: 2025-04-03.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-03-13 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-04-03 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-21590 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |