Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21912: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2026-21912cvecve-2026-21912cwe-367
Published: Thu Jan 15 2026 (01/15/2026, 20:24:20 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

CVE-2026-21912 is a medium severity TOCTOU race condition vulnerability in Juniper Networks Junos OS affecting MX10k Series with LC480 or LC2101 line cards. A local, low-privileged attacker can repeatedly execute the 'show system firmware' CLI command to cause the affected line cards to crash and restart, potentially leading to chassisd process crashes and core dumps. This vulnerability impacts multiple Junos OS versions prior to specific patch releases. Exploitation does not require user interaction but requires local access with low privileges. The vulnerability results in availability disruption without compromising confidentiality or integrity. No known exploits are currently in the wild. European organizations using MX10k Series routers with these line cards should prioritize patching to prevent potential denial-of-service conditions. Countries with significant Juniper infrastructure deployments and critical network backbones are at higher risk. Mitigation involves applying vendor patches once available and restricting local CLI access to trusted administrators only.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:38:11 UTC

Technical Analysis

CVE-2026-21912 identifies a Time-of-check Time-of-use (TOCTOU) race condition vulnerability classified under CWE-367 in Juniper Networks Junos OS running on MX10k Series routers equipped with LC480 or LC2101 line cards. The vulnerability arises in the method responsible for collecting Flexible PIC Concentrator (FPC) Ethernet firmware statistics when the 'show system firmware' CLI command is executed. A local attacker with low privileges can exploit this race condition by repeatedly invoking this command, causing the targeted line card to crash and restart. Subsequently, the chassisd daemon, responsible for chassis management, may also crash and generate core dumps, further impacting system stability. The affected Junos OS versions span multiple releases before specific patch versions: all versions before 21.2R3-S10, from 21.4 before 21.4R3-S9, from 22.2 before 22.2R3-S7, from 22.4 before 22.4R3-S6, from 23.2 before 23.2R2-S2, from 23.4 before 23.4R2-S3, and from 24.2 before 24.2R2. The CVSS v3.1 base score is 5.5 (medium), reflecting the local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at this time. The vulnerability does not allow remote exploitation or privilege escalation but can cause denial-of-service conditions on critical network infrastructure components.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network availability, particularly for those relying on Juniper MX10k Series routers with LC480 or LC2101 line cards in their core or edge network infrastructure. A successful exploitation can cause line card resets and chassisd crashes, leading to temporary loss of routing capabilities, potential network outages, and degraded service quality. This can disrupt business operations, especially for ISPs, data centers, and enterprises with critical network dependencies. While confidentiality and integrity remain unaffected, the availability impact can cascade, affecting dependent services and customers. The requirement for local access limits the attack surface but insider threats or compromised administrative accounts could exploit this vulnerability. Additionally, the generation of core dumps may expose sensitive debugging information if not properly secured. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

1. Apply Juniper Networks' security patches for Junos OS as soon as they become available for the affected versions, prioritizing updates to versions 21.2R3-S10 or later, 21.4R3-S9 or later, 22.2R3-S7 or later, 22.4R3-S6 or later, 23.2R2-S2 or later, 23.4R2-S3 or later, and 24.2R2 or later. 2. Restrict local CLI access to trusted administrators only, implementing strict access controls and monitoring to prevent unauthorized command execution. 3. Employ role-based access control (RBAC) to limit the ability to execute the 'show system firmware' command to necessary personnel. 4. Monitor system logs and chassisd process behavior for signs of repeated crashes or abnormal restarts indicative of exploitation attempts. 5. Implement network segmentation to isolate management interfaces and reduce the risk of lateral movement by attackers with local access. 6. Conduct regular audits of user accounts and privileges to detect and remove unnecessary or dormant accounts. 7. Prepare incident response plans to quickly address potential denial-of-service events affecting network infrastructure. 8. Consider deploying additional redundancy in network paths to mitigate the impact of line card failures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
juniper
Date Reserved
2026-01-05T17:32:48.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69694e771ab3796b10500153

Added to database: 1/15/2026, 8:30:47 PM

Last enriched: 1/22/2026, 9:38:11 PM

Last updated: 2/7/2026, 12:58:45 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats