Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21906: CWE-755 Improper Handling of Exceptional Conditions in Juniper Networks Junos OS

0
High
VulnerabilityCVE-2026-21906cvecve-2026-21906cwe-755
Published: Thu Jan 15 2026 (01/15/2026, 20:20:32 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

An Improper Handling of Exceptional Conditions vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated network-based attacker sending a specific ICMP packet through a GRE tunnel to cause the PFE to crash and restart. When PowerMode IPsec (PMI) and GRE performance acceleration are enabled and the device receives a specific ICMP packet, a crash occurs in the SRX PFE, resulting in traffic loss. PMI is enabled by default, and GRE performance acceleration can be enabled by running the configuration command shown below. PMI is a mode of operation that provides IPsec performance improvements using Vector Packet Processing. Note that PMI with GRE performance acceleration is only supported on specific SRX platforms. This issue affects Junos OS on the SRX Series: * all versions before 21.4R3-S12,  * from 22.4 before 22.4R3-S8,  * from 23.2 before 23.2R2-S5,  * from 23.4 before 23.4R2-S5,  * from 24.2 before 24.2R2-S3,  * from 24.4 before 24.4R2-S1,  * from 25.2 before 25.2R1-S1, 25.2R2.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:45:54 UTC

Technical Analysis

CVE-2026-21906 is a vulnerability classified under CWE-755 (Improper Handling of Exceptional Conditions) affecting the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series devices. The flaw arises when the device is configured with PowerMode IPsec (PMI)—a default mode that enhances IPsec performance using Vector Packet Processing—and GRE performance acceleration is enabled. Under these conditions, receiving a specially crafted ICMP packet encapsulated within a GRE tunnel triggers an unhandled exceptional condition in the PFE, causing it to crash and subsequently restart. This crash leads to a temporary denial of service by interrupting traffic forwarding. The vulnerability affects multiple Junos OS versions before the patched releases 21.4R3-S12, 22.4R3-S8, 23.2R2-S5, 23.4R2-S5, 24.2R2-S3, 24.4R2-S1, and 25.2R1-S1/25.2R2. Exploitation is network-based, requires no authentication or user interaction, and targets specific SRX platforms supporting PMI with GRE acceleration. The vulnerability does not compromise confidentiality or integrity but impacts availability by causing PFE crashes. No public exploits have been reported yet, but the ease of triggering the crash and the default enabling of PMI increase the risk. Juniper has published patches in the specified versions to address this issue.

Potential Impact

For European organizations, the primary impact is a denial-of-service condition on SRX Series firewalls or routers running vulnerable Junos OS versions with PMI and GRE performance acceleration enabled. This can disrupt critical network traffic, potentially affecting business continuity, especially for organizations relying on SRX devices for perimeter security, VPN termination, or traffic routing. The attack requires no authentication and can be launched remotely, increasing the risk of exploitation by threat actors. Disruption of traffic could impact sectors such as finance, telecommunications, government, and critical infrastructure, where Juniper SRX devices are commonly deployed. The temporary loss of availability could lead to operational downtime, loss of productivity, and potential cascading effects on dependent services. While confidentiality and integrity are not directly affected, the denial of service could be leveraged as part of a broader attack strategy or to cause reputational damage.

Mitigation Recommendations

Organizations should immediately verify if their Juniper SRX devices run affected Junos OS versions and have PMI enabled (default) along with GRE performance acceleration enabled (which requires explicit configuration). The most effective mitigation is to upgrade Junos OS to the fixed versions listed by Juniper for each affected release branch. If immediate patching is not feasible, consider disabling GRE performance acceleration to prevent exploitation. Network administrators should monitor for unusual ICMP traffic patterns, especially ICMP packets traversing GRE tunnels, and implement filtering or rate limiting where possible. Deploying intrusion detection/prevention systems with signatures for anomalous ICMP GRE traffic could help detect exploitation attempts. Regularly review device configurations to ensure only necessary features are enabled. Additionally, segmenting management and critical network paths can reduce exposure. Maintain up-to-date backups and incident response plans to quickly recover from potential outages caused by exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e761ab3796b1050010e

Added to database: 1/15/2026, 8:30:46 PM

Last enriched: 1/15/2026, 8:45:54 PM

Last updated: 1/15/2026, 10:51:02 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats