Juniper Networks has released an emergency out-of-cycle security advisory after confirming active exploitation of a zero-day vulnerability in Junos OS, the operating system powering its network equipment. The security advisory, released on March 12, 2025, details a vulnerability identified as CVE-2025-21590 that could allow arbitrary code execution.

The vulnerability stems from insufficient isolation and compartmentalization within the kernel. According to the advisory, exploitation requires privileges to access the underlying FreeBSD-based shell with elevated permissions. Juniper Networks has specified that exploitation is not possible via the Junos CLI interface.

The Common Vulnerability Scoring System has rated this vulnerability with a base score of 4.4 on CVSSv3.1 and 6.7 on CVSSv4.0, classifying it as “Medium” severity. All versions of Junos OS below 21.2R3-S9 are affected, though Juniper Networks noted that Junos OS Evolved remains unaffected by this particular vulnerability.

Chinese Threat Actors Exploiting Vulnerability

Juniper Networks confirmed that exploitation of this vulnerability has already been observed in the wild. Security firm Mandiant has reported that a China-linked attack group has been leveraging the vulnerability to install backdoors on compromised systems. According to their analysis, exploitation appears to have begun around mid-2024.

About Juniper Networks and Junos OS

Juniper Networks is a multinational corporation that develops and markets networking products, including routers, switches, network management software, network security products, and software-defined networking technology. The company’s hardware is widely deployed in large data centers, enterprise networks, and service provider environments.

Junos OS is Juniper Networks’ proprietary operating system that runs on most of its networking hardware. Built on a FreeBSD Unix foundation, Junos OS provides a consistent operating environment across Juniper’s diverse networking product lines. This operating system is critical infrastructure for many organizations, making security vulnerabilities particularly concerning for network administrators.

The timely patching of this vulnerability is especially crucial given its active exploitation by sophisticated threat actors. Network administrators running affected versions of Junos OS should prioritize applying the security update to mitigate the risk of compromise.

Organizations using Juniper networking equipment should verify their current Junos OS version and update to the patched version as soon as possible, especially considering the evidence of active exploitation by nation-state affiliated threat actors.

Share this post

Author

Editorial Team
The Editorial Team at Security Land is comprised of experienced professionals dedicated to delivering insightful analysis, breaking news, and expert perspectives on the ever-evolving threat landscape

Comments