Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21903: CWE-121 Stack-based Buffer Overflow in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2026-21903cvecve-2026-21903cwe-121
Published: Thu Jan 15 2026 (01/15/2026, 20:18:36 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Stack-based Buffer Overflow vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a network-based attacker, authenticated with low privileges to cause a Denial-of-Service (DoS). Subscribing to telemetry sensors at scale causes all FPC connections to drop, resulting in an FPC crash and restart. The issue was not seen when YANG packages for the specific sensors were installed. This issue affects Junos OS:  * all versions before 22.4R3-S7, * 23.2 version before 23.2R2-S4, * 23.4 versions before 23.4R2.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:48:14 UTC

Technical Analysis

CVE-2026-21903 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the Packet Forwarding Engine (PFE) component of Juniper Networks Junos OS. The flaw arises when an authenticated attacker with low privileges subscribes to telemetry sensors at scale, causing all Flexible PIC Concentrator (FPC) connections to drop. This leads to an FPC crash and subsequent restart, resulting in a denial-of-service condition. The vulnerability affects all Junos OS versions before 22.4R3-S7, versions 23.2 prior to 23.2R2-S4, and versions 23.4 before 23.4R2. Notably, the issue does not manifest if YANG packages for the specific telemetry sensors are installed, indicating a correlation between sensor data handling and the overflow. The vulnerability requires network access and low-level authentication but no user interaction. The CVSS v3.1 score is 6.5, reflecting a medium severity primarily due to the impact on availability without confidentiality or integrity compromise. No known exploits are currently reported in the wild. The vulnerability highlights a risk in telemetry data processing within Junos OS, which is critical for network monitoring and management.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network availability, especially for those heavily reliant on Juniper Networks infrastructure for routing and switching. The denial-of-service caused by FPC crashes can disrupt critical network operations, impacting business continuity and service delivery. Telecommunications providers, financial institutions, and large enterprises using Junos OS for their core network infrastructure may experience outages or degraded performance. The requirement for low-privilege authentication means insider threats or compromised credentials could be leveraged to exploit this vulnerability. Although confidentiality and integrity are not directly affected, the availability impact can indirectly affect operational security and compliance with regulations such as the NIS Directive and GDPR, which mandate network resilience. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.

Mitigation Recommendations

European organizations should immediately verify their Junos OS versions and upgrade to the fixed releases: 22.4R3-S7 or later, 23.2R2-S4 or later, and 23.4R2 or later. Where upgrading is not immediately feasible, installing the relevant YANG packages for telemetry sensors can mitigate the issue by preventing the overflow condition. Network administrators should restrict telemetry sensor subscriptions to trusted users and monitor for unusual subscription activity indicative of exploitation attempts. Implement strict access controls and multi-factor authentication for network management interfaces to reduce the risk of low-privilege authenticated attackers. Additionally, network segmentation can limit exposure of critical Junos OS devices. Regularly audit and monitor FPC status and logs for signs of instability or crashes. Engage with Juniper Networks support for any vendor-specific mitigation advice and apply security patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.709Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e761ab3796b10500106

Added to database: 1/15/2026, 8:30:46 PM

Last enriched: 1/15/2026, 8:48:14 PM

Last updated: 1/15/2026, 9:55:40 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats