Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21911: CWE-682 Incorrect Calculation in Juniper Networks Junos OS Evolved

0
Medium
VulnerabilityCVE-2026-21911cvecve-2026-21911cwe-682
Published: Thu Jan 15 2026 (01/15/2026, 20:23:54 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS Evolved

Description

An Incorrect Calculation vulnerability in the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker flapping the management interface to cause the learning of new MACs over label-switched interfaces (LSI) to stop while generating a flood of logs, resulting in high CPU usage. When the issue is seen, the following log message will be generated: op:1 flag:0x6 mac:xx:xx:xx:xx:xx:xx bd:2 ifl:13302 reason:0(REASON_NONE) i-op:6(INTRNL_OP_HW_FORCE_DELETE) status:10 lstatus:10 err:26(GETIFBD_VALIDATE_FAILED) err-reason 4(IFBD_VALIDATE_FAIL_EPOCH_MISMATCH) hw_wr:0x4 ctxsync:0 fwdsync:0 rtt-id:51 p_ifl:0 fwd_nh:0 svlbnh:0 event:- smask:0x100000000 dmask:0x0 mplsmask 0x1 act:0x5800 extf:0x0 pfe-id 0 hw-notif-ifl 13302 programmed-ifl 4294967295 pseudo-vtep underlay-ifl-idx 0 stack:GET_MAC, ALLOCATE_MAC, GET_IFL, GET_IFF, GET_IFBD, STOP, This issue affects Junos OS Evolved:  * all versions before 21.4R3-S7-EVO,  * from 22.2 before 22.2R3-S4-EVO,  * from 22.3 before 22.3R3-S3-EVO,  * from 22.4 before 22.4R3-S2-EVO,  * from 23.2 before 23.2R2-S1-EVO,  * from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:47:16 UTC

Technical Analysis

CVE-2026-21911 is an incorrect calculation vulnerability classified under CWE-682 found in the Layer 2 Control Protocol Daemon (l2cpd) component of Juniper Networks Junos OS Evolved. The flaw arises when an unauthenticated attacker, positioned adjacent to the network, repeatedly flaps the management interface. This triggers a malfunction in the MAC address learning process over label-switched interfaces (LSI), causing the system to cease learning new MAC addresses. Concurrently, the daemon generates a flood of log messages containing detailed error codes such as IFBD_VALIDATE_FAIL_EPOCH_MISMATCH, which leads to excessive CPU consumption. The high CPU usage can degrade device performance and potentially cause denial of service by exhausting processing resources. Affected versions include all releases before 21.4R3-S7-EVO, and multiple subsequent versions up to but not including 23.4R2-EVO. The vulnerability does not require authentication or user interaction but does require network adjacency, meaning the attacker must have access to the same Layer 2 network segment or be able to influence the management interface state. No public exploits are known at this time, but the vulnerability’s characteristics suggest it could be leveraged to disrupt network operations, especially in environments heavily reliant on MPLS and L2 switching. The issue is particularly critical for network infrastructure devices that form the backbone of enterprise and service provider networks.

Potential Impact

For European organizations, the impact of CVE-2026-21911 can be significant, especially for those operating large-scale networks using Juniper routers with Junos OS Evolved. The vulnerability can lead to denial of service by halting MAC address learning on label-switched interfaces, which disrupts normal Layer 2 forwarding and can cause traffic blackholing or flooding. The resulting high CPU usage may degrade router performance, impacting network availability and reliability. Critical sectors such as telecommunications, finance, government, and large enterprises that depend on stable MPLS networks could face operational disruptions. Additionally, the flood of log messages may complicate incident response and monitoring efforts. Although no data confidentiality or integrity loss is indicated, the availability impact alone can cause substantial business interruptions and potential regulatory compliance issues under frameworks like NIS2 and GDPR if network outages affect critical services.

Mitigation Recommendations

1. Apply Juniper’s security patches immediately for all affected Junos OS Evolved versions as soon as they become available. 2. Monitor network management interfaces for unusual flapping activity and investigate any frequent state changes. 3. Implement network segmentation and access controls to limit network adjacency exposure to untrusted devices or users. 4. Enable and tune logging and alerting to detect excessive log generation from l2cpd or abnormal CPU usage on Juniper devices. 5. Employ rate limiting or storm control on management interfaces to reduce the impact of interface flapping. 6. Regularly audit device firmware and software versions to ensure timely patching. 7. Coordinate with network operations teams to prepare incident response plans for potential denial-of-service scenarios affecting MPLS and L2 switching infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e771ab3796b1050014f

Added to database: 1/15/2026, 8:30:47 PM

Last enriched: 1/15/2026, 8:47:16 PM

Last updated: 1/15/2026, 9:31:01 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats