CVE-2025-59980

CWE-3054 documents4 sources
Severity
6.9MEDIUM
EPSS
0.0%
top 87.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9

Description

An Authentication Bypass by Primary Weakness in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device. When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory. This issue affects Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S3,

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5juniper_networks/junos_os23.223.2R2-S3+2
NVDjuniper/junos< 22.4+3

🔴Vulnerability Details

2
GHSA
GHSA-2r3j-v23v-hx4j: An Authentication Bypass by Primary Weakness in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get2025-10-09
CVEList
Junos OS: When a user with the name ftp or anonymous is configured unauthenticated filesystem access is allowed2025-10-09

📋Vendor Advisories

1
Juniper
CVE-2025-59980: An Authentication Bypass by Primary Weakness in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get2025-10-09
CVE-2025-59980 (MEDIUM CVSS 6.9) | An Authentication Bypass by Primary | cvebase.io