An Authentication Bypass by Primary Weakness
in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device.
When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory.
This issue affects Junos OS:
* all versions before 22.4R3-S8,
* 23.2 versions before 23.2R2-S3,
* 23.4 versions before 23.4R2.
References
| Link | Resource |
|---|---|
| https://supportportal.juniper.net/JSA103167 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-09 17:15
Updated : 2026-01-23 18:37
NVD link : CVE-2025-59980
Mitre link : CVE-2025-59980
CVE.ORG link : CVE-2025-59980
JSON object : View
Products Affected
juniper
- junos
CWE
CWE-305
Authentication Bypass by Primary Weakness
