NS-500-VSYS-25
Announced in: ISG 1000 ISG 2000 NS5200 NS5400
Chassis
· NetScreen Series
Is the NS-500-VSYS-25 still supported?
No. Juniper ended support for the ISG 1000 ISG 2000 NS5200 NS5400 on 2021-12-31. No further security fixes will be issued. See Juniper's lifecycle bulletin.
When does the NS-500-VSYS-25 reach end of support?
Juniper support for the ISG 1000 ISG 2000 NS5200 NS5400 ends on 2021-12-31.
What replaces the NS-500-VSYS-25?
Juniper has not published a successor model for the ISG 1000 ISG 2000 NS5200 NS5400.
What known-exploited CVEs apply to the NS-500-VSYS-25 past end of support?
7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform the ISG 1000 ISG 2000 NS5200 NS5400 runs. These will not be patched on this device because it is past the Juniper security-support date. See the Known Exploited Vulnerabilities table below for the full list.
Known Exploited Vulnerabilities
This device is past Juniper's security-support date. 7 CVEs in CISA's Known Exploited Vulnerabilities catalog apply to the platform it runs. Juniper is not issuing patches for this model. Isolate, compensate, or refresh.
| CVE | KEV added | Vulnerability | Flags |
|---|---|---|---|
CVE-2025-21590
|
Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability | ||
CVE-2023-36844
|
Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | ||
CVE-2023-36845
|
Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | ||
CVE-2023-36846
|
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2023-36847
|
Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2023-36851
|
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability | ||
CVE-2020-1631
|
Juniper Junos OS Path Traversal Vulnerability |
Source: CISA Known Exploited Vulnerabilities catalog. The Ransomware flag reflects CISA's own knownRansomwareCampaignUse field, set when the CVE has been observed in ransomware campaigns per their threat intel. It's not a property of the vulnerability description itself.
Correlation is at the platform level, not per-OS-version. Not exhaustive: KEV only lists actively-exploited CVEs and many relevant unexploited vulnerabilities are not here. Verify against vendor security advisories (PSIRT, JSA, PAN-SA) and NVD before acting. See compensating controls if refresh isn't immediate.
NS-500-VSYS-25 Lifecycle Overview
The Juniper NS-500-VSYS-25 (NS-500-VSYS-25) is a chassis product in the Juniper NetScreen series. This product has reached end of life as of , meaning Juniper no longer provides technical support, software updates, or hardware replacement for this product. It was last available for purchase on . Organizations still running the NS-500-VSYS-25 should plan a migration .
Lifecycle Milestones
| Lifecycle notice published | 10y 6mo ago | |
|---|---|---|
| End of sale | 10y ago | |
| Last date of support | 4y 4mo ago |
Additional Dates
| Last Warranty Conversion Date | 9y ago | |
|---|---|---|
| Same Day Support Discontinued Date | 8y ago | |
| Next Day Support Discontinued Date | 6y ago |