Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21909: CWE-401 Missing Release of Memory after Effective Lifetime in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2026-21909cvecve-2026-21909cwe-401
Published: Thu Jan 15 2026 (01/15/2026, 20:22:44 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

CVE-2026-21909 is a medium-severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved affecting versions 23. 2, 23. 4, and 24. 1 before certain patches. It involves a missing release of memory after its effective lifetime in the routing protocol daemon (rpd), specifically triggered by an unauthenticated attacker controlling an adjacent IS-IS neighbor sending crafted update packets. This causes a memory leak that can exhaust system memory, leading to a crash of the rpd process and a denial of service (DoS). No confidentiality or integrity impact is reported, and exploitation does not require authentication or user interaction but does require adjacency in the IS-IS network. Monitoring memory usage via 'show task memory detail' can help detect exploitation attempts. No known exploits are currently in the wild. European organizations relying on Juniper routing infrastructure with IS-IS enabled are at risk, especially in countries with critical network infrastructure and high Juniper market penetration.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:37:06 UTC

Technical Analysis

CVE-2026-21909 is a vulnerability classified under CWE-401 (Missing Release of Memory after Effective Lifetime) affecting Juniper Networks Junos OS and Junos OS Evolved routing protocol daemon (rpd). The flaw exists in the handling of IS-IS routing protocol update packets. An unauthenticated attacker who controls an adjacent IS-IS neighbor can send specially crafted update packets that cause the rpd process to leak memory continuously. Over time, this memory leak exhausts all available memory, causing the rpd process to crash and resulting in a denial of service (DoS) condition on the affected device. The vulnerability affects Junos OS versions from 23.2 before 23.2R2, from 23.4 before 23.4R1-S2 and 23.4R2, and from 24.1 before 24.1R2, as well as corresponding Junos OS Evolved versions. The vulnerability does not impact versions prior to 23.2R1. The attack vector requires adjacency in the IS-IS network but no authentication or user interaction, making it moderately easy to exploit in environments where an attacker can establish IS-IS adjacency. Memory usage can be monitored using the 'show task memory detail' command to detect abnormal increases in memory consumption related to the TED-INFRA-COOKIE task. No known public exploits exist yet, but the vulnerability poses a risk of network disruption due to DoS. The CVSS v3.1 score is 6.5 (medium), reflecting the lack of confidentiality or integrity impact but significant availability impact and ease of exploitation given adjacency. Juniper has not yet published patches linked in the provided data but versions fixed are indicated, so patching is expected to be available or forthcoming.

Potential Impact

For European organizations, especially those operating critical network infrastructure or large enterprise networks using Juniper routing devices with IS-IS enabled, this vulnerability can cause significant disruption. The DoS condition resulting from rpd crashes can lead to routing outages, network instability, and potential loss of connectivity affecting business operations and services. Telecommunications providers, data centers, and large enterprises relying on Juniper Junos OS for core or edge routing are particularly at risk. The requirement for adjacency in the IS-IS network limits the attack surface to internal or trusted network segments, but insider threats or compromised adjacent devices could exploit this vulnerability. The absence of confidentiality or integrity impact reduces risk of data breach but availability impact can cause operational downtime and financial loss. Given the widespread use of Juniper devices in European telecom and enterprise sectors, the potential for service disruption is notable. Countries with advanced network infrastructure and high Juniper deployment, such as Germany, France, the UK, and the Netherlands, may face higher exposure. The vulnerability also poses risks to national critical infrastructure networks that rely on Juniper routing platforms.

Mitigation Recommendations

1. Apply vendor patches promptly once they become available for affected Junos OS and Junos OS Evolved versions (23.2, 23.4, 24.1 branches). 2. Monitor memory usage on Juniper devices using 'show task memory detail' focusing on TED-INFRA-COOKIE or related tasks to detect abnormal memory growth indicative of exploitation attempts. 3. Restrict IS-IS adjacency to trusted devices only; implement strict network segmentation and access controls to limit which devices can form IS-IS neighbor relationships. 4. Employ network monitoring and anomaly detection tools to identify unusual IS-IS update packet patterns or traffic spikes that may signal attack attempts. 5. Regularly audit network topology and routing protocol configurations to ensure no unauthorized devices can establish IS-IS adjacency. 6. Consider disabling IS-IS on interfaces where it is not required to reduce attack surface. 7. Maintain up-to-date inventory of Juniper devices and their software versions to prioritize patching and risk assessment. 8. Engage with Juniper support and security advisories for updates and recommended best practices. These steps go beyond generic advice by focusing on protocol adjacency controls, active memory monitoring, and network segmentation tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e771ab3796b10500147

Added to database: 1/15/2026, 8:30:47 PM

Last enriched: 1/22/2026, 9:37:06 PM

Last updated: 2/7/2026, 7:29:41 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats