CVE-2025-13914 PUBLISHED

Apstra: SSH host key validation vulnerability for managed devices

Assigner: juniper
Reserved: 02.12.2025 Published: 09.04.2026 Updated: 09.04.2026

A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a unauthenticated, MITM

attacker to impersonate managed devices.

Due to insufficient SSH host key validation an attacker can perform a machine-in-the-middle attack on the SSH connections from Apstra to managed devices, enabling an attacker to impersonate a managed device and capture user credentials.

This issue affects all versions of Apstra before 6.1.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/R:U/RE:M
CVSS Score: 7

Product Status

Vendor Juniper Networks
Product Apstra
Versions Default: unaffected
  • affected from 0 to 6.1.1 (excl.)

Exploits

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

Workarounds

There are no known workarounds for this issue.

Solutions

The following software releases have been updated to resolve this specific issue: Apstra 6.1.1, and all subsequent releases.

Credits

  • Juniper SIRT would like to acknowledge and thank the Federal Office for Information Security (BSI) for responsibly reporting this vulnerability. finder

References

Problem Types

  • CWE-322 Key Exchange without Entity Authentication CWE