CVE-2026-21921

MEDIUM

Juniper Junos OS and Junos OS Evolved - Authenticated Denial of Service via Telemetry Subscription Handling

Title source: llm
STIX 2.1

Description

A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are frequently subscribing and unsubscribing to sensors continuously over a long period of time, telemetry-capable processes like chassisd, rpd or mib2d will crash and restart, which - depending on the process - can cause a complete outage until the system has recovered. This issue affects:  Junos OS:  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-EVO.

References (2)

Core 2
Core References
Vendor Advisory vendor-advisory
https://supportportal.juniper.net/JSA106021
Vendor Advisory vendor-advisory
https://kb.juniper.net/JSA106021

Scores

CVSS v3 6.5
EPSS 0.0002
EPSS Percentile 6.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-416
Status published
Products (6)
juniper/junos 22.4 (15 CPE variants)
juniper/junos 23.2 (9 CPE variants)
juniper/junos 23.4 (4 CPE variants)
juniper/junos < 22.4
juniper/junos_os_evolved 22.4 (15 CPE variants)
juniper/junos_os_evolved 23.2 (6 CPE variants)
Published Jan 15, 2026
Tracked Since Feb 18, 2026