Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21908: CWE-416 Use After Free in Juniper Networks Junos OS

0
High
VulnerabilityCVE-2026-21908cvecve-2026-21908cwe-416
Published: Thu Jan 15 2026 (01/15/2026, 20:21:41 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, leading to a Denial of Service (DoS), or potentially execute arbitrary code within the context of the process running as root. The issue is specific to the processing of a change in authorization (CoA) when a port bounce occurs. A pointer is freed but was then referenced later in the same code path. Successful exploitation is outside the attacker's direct control due to the specific timing of the two events required to execute the vulnerable code path. This issue affects systems with 802.1X authentication port-based network access control (PNAC) enabled. This issue affects: Junos OS:  * from 23.2R2-S1 before 23.2R2-S5,  * from 23.4R2 before 23.4R2-S6,  * from 24.2 before 24.2R2-S3,  * from 24.4 before 24.4R2-S1,  * from 25.2 before 25.2R1-S2, 25.2R2;  Junos OS Evolved:  * from 23.2R2-S1 before 23.2R2-S5-EVO,  * from 23.4R2 before 23.4R2-S6-EVO,  * from 24.2 before 24.2R2-S3-EVO,  * from 24.4 before 24.4R2-S1-EVO,  * from 25.2 before 25.2R1-S2-EVO, 25.2R2-EVO.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:45:38 UTC

Technical Analysis

CVE-2026-21908 is a Use After Free vulnerability identified in the dot1xd daemon responsible for 802.1X authentication in Juniper Networks Junos OS and Junos OS Evolved. The flaw exists in the handling of Change of Authorization (CoA) messages when a port bounce occurs. Specifically, the code frees a pointer but later references it within the same execution path, leading to a use-after-free condition. This can cause the dot1xd process to crash, resulting in a denial of service (DoS). More critically, due to the process running with root privileges, an attacker may exploit this flaw to execute arbitrary code with elevated privileges. The attacker must be authenticated and network-adjacent, meaning they have some level of access to the network but do not require direct user interaction. Exploitation is complicated by the need for precise timing between freeing and referencing the pointer, making successful exploitation less straightforward but still feasible. The vulnerability affects multiple versions of Junos OS and Junos OS Evolved from 23.2R2-S1 up to versions before the respective fixed releases (e.g., 23.2R2-S5, 23.4R2-S6, 24.2R2-S3, 24.4R2-S1, 25.2R1-S2). The vulnerability is tracked under CWE-416 (Use After Free) and has a CVSS v3.1 score of 7.1, reflecting high severity with attack vector as adjacent network, high complexity, low privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for root-level code execution makes this a critical issue for affected environments. Systems with 802.1X port-based network access control enabled are vulnerable, which is common in enterprise and service provider networks for controlling network access. Juniper has published patches in the indicated fixed versions, and organizations should apply these promptly to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2026-21908 can be significant, especially for those relying on Juniper Networks infrastructure with 802.1X authentication enabled. The vulnerability can lead to denial of service by crashing the dot1xd process, disrupting network access control and potentially causing network outages or degraded service availability. More severely, the possibility of arbitrary code execution with root privileges could allow attackers to compromise network devices, leading to unauthorized access, interception or manipulation of network traffic, and lateral movement within the network. This could impact confidentiality, integrity, and availability of critical network infrastructure. Sectors such as telecommunications, finance, government, and critical infrastructure in Europe that deploy Juniper devices extensively are at higher risk. The requirement for the attacker to be authenticated and network-adjacent limits the attack surface but does not eliminate risk, especially in environments with large user bases or guest networks. The disruption or compromise of network access control mechanisms can have cascading effects on organizational security posture and compliance with regulations such as GDPR. Given the high severity and potential for root-level compromise, the threat poses a substantial risk to operational continuity and data security in European enterprises and service providers.

Mitigation Recommendations

European organizations should immediately assess their Juniper Networks Junos OS and Junos OS Evolved deployments to identify affected versions running 802.1X authentication. The primary mitigation is to apply the vendor-provided patches available in the fixed releases (e.g., 23.2R2-S5, 23.4R2-S6, 24.2R2-S3, 24.4R2-S1, 25.2R1-S2 and their EVO equivalents). Until patches are applied, organizations should consider the following additional measures: 1) Restrict network adjacency by segmenting and isolating management and authentication traffic to trusted zones to reduce attacker access. 2) Monitor network logs and dot1xd process behavior for crashes or anomalies indicating exploitation attempts. 3) Implement strict access controls and authentication mechanisms to limit the number of authenticated users who can trigger port bounces. 4) Employ network intrusion detection systems (NIDS) tuned to detect unusual CoA or port bounce activity. 5) Conduct regular security audits and vulnerability scans focusing on network access control components. 6) Coordinate with Juniper support for guidance and verify firmware versions during maintenance windows. These steps, combined with timely patching, will reduce exposure and mitigate the risk of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e771ab3796b10500143

Added to database: 1/15/2026, 8:30:47 PM

Last enriched: 1/15/2026, 8:45:38 PM

Last updated: 1/15/2026, 10:48:38 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats