🔐 CVE Alert

CVE-2025-13914

HIGH 8.7

Apstra: SSH host key validation vulnerability for managed devices

CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
9th

A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a unauthenticated, MITM attacker to impersonate managed devices. Due to insufficient SSH host key validation an attacker can perform a machine-in-the-middle attack on the SSH connections from Apstra to managed devices, enabling an attacker to impersonate a managed device and capture user credentials. This issue affects all versions of Apstra before 6.1.1.

CWE CWE-322
Vendor juniper networks
Product apstra
Published Apr 9, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for juniper networks apstra

Be the first to know when new high vulnerabilities affecting juniper networks apstra are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Juniper Networks / Apstra
0 < 6.1.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
kb.juniper.net: https://kb.juniper.net/JSA107862

Credits

Juniper SIRT would like to acknowledge and thank the Federal Office for Information Security (BSI) for responsibly reporting this vulnerability.