Create cve-2025-60010-password-aging-bypass #44
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Case Study: CWE-262 – Not Using Password Aging
This case study examines CWE-262, where Junos OS and Junos OS Evolved fail to enforce password expiration when using RADIUS authentication. Users with expired passwords can still log in, bypassing credential-aging policies and increasing the risk of persistent unauthorized access. The case study analyzes CVE-2025-60010, explains the authentication flaw, its impact, and real-world implications, and maps it to CWE-262.
Mitigation: apply vendor patches, enforce password rotation, enable multi-factor authentication, and monitor stale credentials.
Prevention: validate external authentication signals, enforce password-aging rules, and adopt secure defaults aligned with modern standards.
References: Issue #21