EXECUTIVE SUMMARY:
The CVEs CVE-2024-6387, CVE-2024-39894, CVE-2025-21598, and CVE-2025-21599 highlight vulnerabilities of varying severity. CVE-2024-6387, known as "RegreSSHion," is a critical flaw in OpenSSH versions 8.5p1 to 9.7p1, allowing remote code execution due to a signal handler race condition in the server component. CVE-2024-39894 is a high-severity vulnerability in OpenSSH versions 9.5 to 9.7, where timing attacks against password entries can leak sensitive information. Currently, CVE-2025-21598 and CVE-2025-21599 lack publicly available details, indicating they might still be under investigation or embargo. These CVEs emphasize the need for proactive patching and monitoring of software environments to mitigate risks.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
The CVEs CVE-2024-6387, CVE-2024-39894, CVE-2025-21598, and CVE-2025-21599 highlight vulnerabilities of varying severity. CVE-2024-6387, known as "RegreSSHion," is a critical flaw in OpenSSH versions 8.5p1 to 9.7p1, allowing remote code execution due to a signal handler race condition in the server component. CVE-2024-39894 is a high-severity vulnerability in OpenSSH versions 9.5 to 9.7, where timing attacks against password entries can leak sensitive information. Currently, CVE-2025-21598 and CVE-2025-21599 lack publicly available details, indicating they might still be under investigation or embargo. These CVEs emphasize the need for proactive patching and monitoring of software environments to mitigate risks.[emaillocker id="1283"]
This vulnerability poses a serious threat to systems running Junos OS Evolved, allowing attackers to cause denial-of-service (DoS) conditions through memory exhaustion. Immediate patching is essential to protect system stability and availability.
RECOMMENDATION:
We strongly recommend you update Juniper Firewall Product to versions:
For CVE-2025-21599 , please update Junos OS Evolved to versions 22.4R3-S5-EVO, 23.2R2-S2-EVO, 23.4R2-S2-EVO, 24.2R1-S2-EVO, 24.2R2-EVO*, 24.4R1-EVO.
REFERENCES:
The following reports contain further technical details:
https://www.securityweek.com/juniper-networks-fixes-high-severity-vulnerabilities-in-junos-os/