Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21908: CWE-416 Use After Free in Juniper Networks Junos OS

0
High
VulnerabilityCVE-2026-21908cvecve-2026-21908cwe-416
Published: Thu Jan 15 2026 (01/15/2026, 20:21:41 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, leading to a Denial of Service (DoS), or potentially execute arbitrary code within the context of the process running as root. The issue is specific to the processing of a change in authorization (CoA) when a port bounce occurs. A pointer is freed but was then referenced later in the same code path. Successful exploitation is outside the attacker's direct control due to the specific timing of the two events required to execute the vulnerable code path. This issue affects systems with 802.1X authentication port-based network access control (PNAC) enabled. This issue affects: Junos OS:  * from 23.2R2-S1 before 23.2R2-S5,  * from 23.4R2 before 23.4R2-S6,  * from 24.2 before 24.2R2-S3,  * from 24.4 before 24.4R2-S1,  * from 25.2 before 25.2R1-S2, 25.2R2;  Junos OS Evolved:  * from 23.2R2-S1 before 23.2R2-S5-EVO,  * from 23.4R2 before 23.4R2-S6-EVO,  * from 24.2 before 24.2R2-S3-EVO,  * from 24.4 before 24.4R2-S1-EVO,  * from 25.2 before 25.2R1-S2-EVO, 25.2R2-EVO.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:03:42 UTC

Technical Analysis

CVE-2026-21908 is a Use After Free vulnerability classified under CWE-416, found in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved. The flaw arises during the processing of a Change of Authorization (CoA) event triggered by a port bounce (port flap). Specifically, a pointer is freed but subsequently referenced later in the same code path, leading to a Use After Free condition. This memory corruption can cause the dot1xd process to crash, resulting in a Denial of Service (DoS). More critically, it may enable an authenticated, network-adjacent attacker to execute arbitrary code within the context of the dot1xd process, which runs with root privileges, thereby compromising system confidentiality, integrity, and availability. The vulnerability affects multiple Junos OS versions starting from 23.2R2-S1 up to versions before 23.2R2-S5, 23.4R2 before 23.4R2-S6, 24.2 before 24.2R2-S3, 24.4 before 24.4R2-S1, and 25.2 before 25.2R1-S2 and 25.2R2, including their Junos OS Evolved counterparts. Exploitation requires the attacker to be authenticated and network-adjacent, with no user interaction needed, but the timing of port flapping and CoA processing must align precisely, limiting direct control over successful exploitation. No public exploits are known at this time, but the high CVSS score (7.1) reflects the significant risk posed by this vulnerability. The issue is critical for environments utilizing 802.1X port-based network access control, a common security feature in enterprise and service provider networks.

Potential Impact

The impact of CVE-2026-21908 is significant for organizations deploying Juniper Networks devices running affected versions of Junos OS with 802.1X authentication enabled. Successful exploitation can lead to a Denial of Service by crashing the dot1xd process, disrupting network access control and potentially causing network outages or degraded service. More severely, arbitrary code execution with root privileges could allow attackers to fully compromise affected devices, leading to unauthorized access, data exfiltration, network manipulation, or persistent footholds within critical network infrastructure. This can undermine the security posture of enterprise, data center, and service provider networks relying on Juniper devices for secure network access control. Given the root-level execution context, the vulnerability could facilitate lateral movement and further attacks within the network. The requirement for attacker authentication and network adjacency somewhat limits remote exploitation but does not eliminate risk in environments where attackers can gain initial access or are internal threat actors. The absence of known exploits in the wild provides a window for remediation before active exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2026-21908, organizations should prioritize upgrading affected Junos OS and Junos OS Evolved devices to the fixed versions released by Juniper Networks (e.g., versions at or beyond 23.2R2-S5, 23.4R2-S6, 24.2R2-S3, 24.4R2-S1, 25.2R1-S2, and their Evolved equivalents). Until patches can be applied, consider the following specific mitigations: 1) Restrict network access to management and 802.1X authentication services to trusted, authenticated users only, minimizing exposure to network-adjacent attackers. 2) Monitor and alert on unusual port flapping or CoA events that could indicate exploitation attempts. 3) Implement strict network segmentation to isolate critical Juniper devices and limit lateral movement if compromise occurs. 4) Employ network access control policies to detect and block anomalous authentication or port bounce behavior. 5) Regularly audit device configurations to ensure 802.1X is enabled only where necessary and properly secured. 6) Use Juniper’s security advisories and tools to verify device firmware versions and compliance. These targeted steps, combined with timely patching, will reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e771ab3796b10500143

Added to database: 1/15/2026, 8:30:47 PM

Last enriched: 2/27/2026, 8:03:42 AM

Last updated: 3/25/2026, 3:20:50 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses