Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2025-37
Version:
1.0
Affected software:
Juniper Networks Session Smart Router, Session Smart Conductor, Wan Assurance Managed Routers.
Type:
Authentication Bypass
CVE/CVSS:
CVE-2025-21589: CVSS 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Successful exploitation of this vulnerability in specific versions of Juniper Networks Session Smart Router, Session Smart Conductor, and WAN Assurance Managed Routers could lead to complete system compromise.
This vulnerability has a significant impact on confidentiality, integrity, and availability.
There is currently no evidence of this vulnerability being actively exploited, nor are there any proof-of-concept exploits available at this time.
This vulnerability allows attackers to bypass authentication through an alternate path or channel, enabling potential unauthorized administrative access to the device.
Possible attack scenario:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.