CVE-2026-21910: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
CVE-2026-21910 is a medium-severity vulnerability in Juniper Networks Junos OS affecting EX4k and QFX5k Series platforms that support EVPN-VXLAN VPLAG configurations. An unauthenticated network-adjacent attacker can cause a denial of service by flapping an interface, which leads to traffic drops between VXLAN Network Identifiers (VNIs). The issue arises when multiple load-balanced next-hop routes exist for the same destination and a link flap occurs in an EVPN-VXLAN LAG. Recovery requires manual restart of the affected FPC slot. The vulnerability affects multiple Junos OS versions prior to specific patched releases. No known exploits are currently reported in the wild. Defenders should prioritize patching affected devices and consider network design adjustments to mitigate impact.
AI Analysis
Technical Summary
CVE-2026-21910 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) found in the packet forwarding engine (PFE) of Juniper Networks Junos OS running on EX4k and QFX5k Series platforms, including models such as QFX5110, QFX5120, QFX5200, EX4100, EX4300, EX4400, and EX4650. The flaw occurs specifically in environments configured with EVPN-VXLAN Virtual Port-Link Aggregation Groups (VPLAG). When an unauthenticated attacker adjacent to the network induces a link flap on an interface within an EVPN-VXLAN LAG, the system improperly handles this exceptional condition. This leads to dropped traffic between VXLAN Network Identifiers (VNIs) when multiple load-balanced next-hop routes exist for the same destination, effectively causing a denial of service (DoS) by interrupting inter-VNI communication. The vulnerability affects all Junos OS versions before 21.4R3-S12, all 22.2 versions, and certain releases in 22.4, 23.2, 23.4, 24.2, and 24.4 branches prior to their respective patch releases. Service restoration requires a manual restart of the affected Flexible PIC Concentrator (FPC) slot using the 'request chassis fpc restart slot <slot-number>' command. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, no privileges required, no user interaction, and impact limited to availability. No known exploits have been reported in the wild, but the vulnerability presents a risk to network stability in environments using EVPN-VXLAN VPLAG on affected Juniper platforms.
Potential Impact
For European organizations relying on Juniper EX4k and QFX5k Series switches configured with EVPN-VXLAN VPLAG, this vulnerability can cause significant network disruption. The denial of service results in dropped traffic between VXLAN Network Identifiers, potentially impacting data center interconnects, cloud environments, and enterprise networks that use VXLAN overlays for segmentation and scalability. This can degrade application performance, interrupt critical services, and cause operational downtime until manual intervention is performed. The need for manual FPC restart may delay recovery and increase operational overhead. Organizations with high availability and strict uptime requirements, such as financial institutions, telecommunications providers, and critical infrastructure operators, may face increased risk. Although no confidentiality or integrity impact is reported, availability degradation can have cascading effects on business continuity and service level agreements (SLAs).
Mitigation Recommendations
1. Apply Juniper's official patches and updates for Junos OS as soon as they become available, specifically versions 21.4R3-S12 and later patched releases for affected branches. 2. Monitor network interfaces for unusual link flapping events and implement automated alerts to detect potential exploitation attempts. 3. Where possible, limit network adjacency and control access to management and forwarding planes to reduce exposure to unauthenticated attackers. 4. Review EVPN-VXLAN VPLAG configurations to assess if multiple load-balanced next-hop routes can be optimized or simplified to reduce risk. 5. Implement redundancy and failover mechanisms to minimize impact during FPC restarts. 6. Prepare operational procedures for rapid FPC slot restart to minimize downtime if the issue occurs. 7. Consider network segmentation and micro-segmentation to isolate critical VXLAN segments. 8. Engage with Juniper support for guidance on interim workarounds if patching is delayed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Switzerland
CVE-2026-21910: CWE-754 Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS
Description
CVE-2026-21910 is a medium-severity vulnerability in Juniper Networks Junos OS affecting EX4k and QFX5k Series platforms that support EVPN-VXLAN VPLAG configurations. An unauthenticated network-adjacent attacker can cause a denial of service by flapping an interface, which leads to traffic drops between VXLAN Network Identifiers (VNIs). The issue arises when multiple load-balanced next-hop routes exist for the same destination and a link flap occurs in an EVPN-VXLAN LAG. Recovery requires manual restart of the affected FPC slot. The vulnerability affects multiple Junos OS versions prior to specific patched releases. No known exploits are currently reported in the wild. Defenders should prioritize patching affected devices and consider network design adjustments to mitigate impact.
AI-Powered Analysis
Technical Analysis
CVE-2026-21910 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) found in the packet forwarding engine (PFE) of Juniper Networks Junos OS running on EX4k and QFX5k Series platforms, including models such as QFX5110, QFX5120, QFX5200, EX4100, EX4300, EX4400, and EX4650. The flaw occurs specifically in environments configured with EVPN-VXLAN Virtual Port-Link Aggregation Groups (VPLAG). When an unauthenticated attacker adjacent to the network induces a link flap on an interface within an EVPN-VXLAN LAG, the system improperly handles this exceptional condition. This leads to dropped traffic between VXLAN Network Identifiers (VNIs) when multiple load-balanced next-hop routes exist for the same destination, effectively causing a denial of service (DoS) by interrupting inter-VNI communication. The vulnerability affects all Junos OS versions before 21.4R3-S12, all 22.2 versions, and certain releases in 22.4, 23.2, 23.4, 24.2, and 24.4 branches prior to their respective patch releases. Service restoration requires a manual restart of the affected Flexible PIC Concentrator (FPC) slot using the 'request chassis fpc restart slot <slot-number>' command. The CVSS v3.1 base score is 6.5, reflecting a medium severity with network attack vector, no privileges required, no user interaction, and impact limited to availability. No known exploits have been reported in the wild, but the vulnerability presents a risk to network stability in environments using EVPN-VXLAN VPLAG on affected Juniper platforms.
Potential Impact
For European organizations relying on Juniper EX4k and QFX5k Series switches configured with EVPN-VXLAN VPLAG, this vulnerability can cause significant network disruption. The denial of service results in dropped traffic between VXLAN Network Identifiers, potentially impacting data center interconnects, cloud environments, and enterprise networks that use VXLAN overlays for segmentation and scalability. This can degrade application performance, interrupt critical services, and cause operational downtime until manual intervention is performed. The need for manual FPC restart may delay recovery and increase operational overhead. Organizations with high availability and strict uptime requirements, such as financial institutions, telecommunications providers, and critical infrastructure operators, may face increased risk. Although no confidentiality or integrity impact is reported, availability degradation can have cascading effects on business continuity and service level agreements (SLAs).
Mitigation Recommendations
1. Apply Juniper's official patches and updates for Junos OS as soon as they become available, specifically versions 21.4R3-S12 and later patched releases for affected branches. 2. Monitor network interfaces for unusual link flapping events and implement automated alerts to detect potential exploitation attempts. 3. Where possible, limit network adjacency and control access to management and forwarding planes to reduce exposure to unauthenticated attackers. 4. Review EVPN-VXLAN VPLAG configurations to assess if multiple load-balanced next-hop routes can be optimized or simplified to reduce risk. 5. Implement redundancy and failover mechanisms to minimize impact during FPC restarts. 6. Prepare operational procedures for rapid FPC slot restart to minimize downtime if the issue occurs. 7. Consider network segmentation and micro-segmentation to isolate critical VXLAN segments. 8. Engage with Juniper support for guidance on interim workarounds if patching is delayed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- juniper
- Date Reserved
- 2026-01-05T17:32:48.710Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69694e771ab3796b1050014b
Added to database: 1/15/2026, 8:30:47 PM
Last enriched: 1/22/2026, 9:37:24 PM
Last updated: 2/7/2026, 10:01:21 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.