J6350-SSG-CONV-S
Announced in: SSG 140 SSG 300 SSG 500 Series
Chassis
· J Series
Is the J6350-SSG-CONV-S still supported?
No. Juniper ended support for the SSG 140 SSG 300 SSG 500 Series on 2021-12-31. No further security fixes will be issued. See Juniper's lifecycle bulletin.
When does the J6350-SSG-CONV-S reach end of support?
Juniper support for the SSG 140 SSG 300 SSG 500 Series ends on 2021-12-31.
What replaces the J6350-SSG-CONV-S?
Juniper has not published a successor model for the SSG 140 SSG 300 SSG 500 Series.
What known-exploited CVEs apply to the J6350-SSG-CONV-S past end of support?
7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform the SSG 140 SSG 300 SSG 500 Series runs. These will not be patched on this device because it is past the Juniper security-support date. See the Known Exploited Vulnerabilities table below for the full list.
Known Exploited Vulnerabilities
This device is past Juniper's security-support date. 7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform it runs. Juniper is not issuing patches for this model. Isolate, compensate, or refresh.
| CVE | KEV added | Vulnerability | Flags |
|---|---|---|---|
CVE-2025-21590
|
Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability | ||
CVE-2023-36844
|
Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | ||
CVE-2023-36845
|
Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | ||
CVE-2023-36846
|
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2023-36847
|
Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2023-36851
|
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2020-1631
|
Juniper Junos OS Path Traversal Vulnerability |
Source: CISA Known Exploited Vulnerabilities catalog. The Ransomware flag reflects CISA's own knownRansomwareCampaignUse field, set when the CVE has been observed in ransomware campaigns per their threat intel. It's not a property of the vulnerability description itself.
Correlation is at the platform level, not per-OS-version. Not exhaustive: KEV only lists actively-exploited CVEs and many relevant unexploited vulnerabilities are not here. Verify against vendor security advisories (PSIRT, JSA, PAN-SA) and NVD before acting. See compensating controls if refresh isn't immediate.
J6350-SSG-CONV-S Lifecycle Overview
The Juniper J6350-SSG-CONV-S (J6350-SSG-CONV-S) is a chassis product in the Juniper J series. This product has reached end of life as of , meaning Juniper no longer provides technical support, software updates, or hardware replacement for this product. It was last available for purchase on . Organizations still running the J6350-SSG-CONV-S should plan a migration .
Lifecycle Milestones
| Lifecycle notice published | 10y 9mo ago | |
|---|---|---|
| End of sale | 10y 3mo ago | |
| Last date of support | 4y 4mo ago |
Additional Dates
| Last Warranty Conversion Date | 9y 3mo ago | |
|---|---|---|
| Same Day Support Discontinued Date | 8y 3mo ago | |
| Next Day Support Discontinued Date | 6y 3mo ago |