CVE-2026-21903: CWE-121 Stack-based Buffer Overflow in Juniper Networks Junos OS
A Stack-based Buffer Overflow vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a network-based attacker, authenticated with low privileges to cause a Denial-of-Service (DoS). Subscribing to telemetry sensors at scale causes all FPC connections to drop, resulting in an FPC crash and restart. The issue was not seen when YANG packages for the specific sensors were installed. This issue affects Junos OS: * all versions before 22.4R3-S7, * 23.2 version before 23.2R2-S4, * 23.4 versions before 23.4R2.
AI Analysis
Technical Summary
CVE-2026-21903 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the Packet Forwarding Engine (PFE) component of Juniper Networks Junos OS. The flaw arises when an authenticated attacker with low privileges subscribes to telemetry sensors at scale, causing all Flexible PIC Concentrator (FPC) connections to drop. This leads to an FPC crash and subsequent restart, resulting in a denial-of-service condition. The vulnerability affects all Junos OS versions before 22.4R3-S7, versions 23.2 prior to 23.2R2-S4, and versions 23.4 before 23.4R2. Notably, the issue does not manifest if YANG packages for the specific telemetry sensors are installed, indicating a correlation between sensor data handling and the overflow. The vulnerability requires network access and low-level authentication but no user interaction. The CVSS v3.1 score is 6.5, reflecting a medium severity primarily due to the impact on availability without confidentiality or integrity compromise. No known exploits are currently reported in the wild. The vulnerability highlights a risk in telemetry data processing within Junos OS, which is critical for network monitoring and management.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network availability, especially for those heavily reliant on Juniper Networks infrastructure for routing and switching. The denial-of-service caused by FPC crashes can disrupt critical network operations, impacting business continuity and service delivery. Telecommunications providers, financial institutions, and large enterprises using Junos OS for their core network infrastructure may experience outages or degraded performance. The requirement for low-privilege authentication means insider threats or compromised credentials could be leveraged to exploit this vulnerability. Although confidentiality and integrity are not directly affected, the availability impact can indirectly affect operational security and compliance with regulations such as the NIS Directive and GDPR, which mandate network resilience. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
European organizations should immediately verify their Junos OS versions and upgrade to the fixed releases: 22.4R3-S7 or later, 23.2R2-S4 or later, and 23.4R2 or later. Where upgrading is not immediately feasible, installing the relevant YANG packages for telemetry sensors can mitigate the issue by preventing the overflow condition. Network administrators should restrict telemetry sensor subscriptions to trusted users and monitor for unusual subscription activity indicative of exploitation attempts. Implement strict access controls and multi-factor authentication for network management interfaces to reduce the risk of low-privilege authenticated attackers. Additionally, network segmentation can limit exposure of critical Junos OS devices. Regularly audit and monitor FPC status and logs for signs of instability or crashes. Engage with Juniper Networks support for any vendor-specific mitigation advice and apply security patches promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2026-21903: CWE-121 Stack-based Buffer Overflow in Juniper Networks Junos OS
Description
A Stack-based Buffer Overflow vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a network-based attacker, authenticated with low privileges to cause a Denial-of-Service (DoS). Subscribing to telemetry sensors at scale causes all FPC connections to drop, resulting in an FPC crash and restart. The issue was not seen when YANG packages for the specific sensors were installed. This issue affects Junos OS: * all versions before 22.4R3-S7, * 23.2 version before 23.2R2-S4, * 23.4 versions before 23.4R2.
AI-Powered Analysis
Technical Analysis
CVE-2026-21903 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the Packet Forwarding Engine (PFE) component of Juniper Networks Junos OS. The flaw arises when an authenticated attacker with low privileges subscribes to telemetry sensors at scale, causing all Flexible PIC Concentrator (FPC) connections to drop. This leads to an FPC crash and subsequent restart, resulting in a denial-of-service condition. The vulnerability affects all Junos OS versions before 22.4R3-S7, versions 23.2 prior to 23.2R2-S4, and versions 23.4 before 23.4R2. Notably, the issue does not manifest if YANG packages for the specific telemetry sensors are installed, indicating a correlation between sensor data handling and the overflow. The vulnerability requires network access and low-level authentication but no user interaction. The CVSS v3.1 score is 6.5, reflecting a medium severity primarily due to the impact on availability without confidentiality or integrity compromise. No known exploits are currently reported in the wild. The vulnerability highlights a risk in telemetry data processing within Junos OS, which is critical for network monitoring and management.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network availability, especially for those heavily reliant on Juniper Networks infrastructure for routing and switching. The denial-of-service caused by FPC crashes can disrupt critical network operations, impacting business continuity and service delivery. Telecommunications providers, financial institutions, and large enterprises using Junos OS for their core network infrastructure may experience outages or degraded performance. The requirement for low-privilege authentication means insider threats or compromised credentials could be leveraged to exploit this vulnerability. Although confidentiality and integrity are not directly affected, the availability impact can indirectly affect operational security and compliance with regulations such as the NIS Directive and GDPR, which mandate network resilience. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
European organizations should immediately verify their Junos OS versions and upgrade to the fixed releases: 22.4R3-S7 or later, 23.2R2-S4 or later, and 23.4R2 or later. Where upgrading is not immediately feasible, installing the relevant YANG packages for telemetry sensors can mitigate the issue by preventing the overflow condition. Network administrators should restrict telemetry sensor subscriptions to trusted users and monitor for unusual subscription activity indicative of exploitation attempts. Implement strict access controls and multi-factor authentication for network management interfaces to reduce the risk of low-privilege authenticated attackers. Additionally, network segmentation can limit exposure of critical Junos OS devices. Regularly audit and monitor FPC status and logs for signs of instability or crashes. Engage with Juniper Networks support for any vendor-specific mitigation advice and apply security patches promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2026-01-05T17:32:48.709Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69694e761ab3796b10500106
Added to database: 1/15/2026, 8:30:46 PM
Last enriched: 1/15/2026, 8:48:14 PM
Last updated: 1/15/2026, 9:55:40 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67822: n/a
UnknownCVE-2025-59959: CWE-822 Untrusted Pointer Dereference in Juniper Networks Junos OS
MediumCVE-2025-52987: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in Juniper Networks Paragon Automation (Pathfinder, Planner, Insights)
MediumCVE-2025-65368: n/a
MediumCVE-2025-67025: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.