Warning: Critical Unauthenticated RCE Vulnerability in Junos OS Evolved, Patch Immediately!

Image
Decorative image
Published : 27/02/2026
  • Last update: 27/02/2026
  • Affected software:
    → Junos OS Evolved: PTX Series versions before 25.4R1-S1-EVO, 25.4R2-EVO
  • Type: CWE-732 Incorrect Permission Assignment for Critical Resource
  • CVE/CVSS
    → CVE-2026-21902: CVSS 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/AU:Y/R:U/RE:M/U:Red)

Sources

https://supportportal.juniper.net/s/article/2026-02-Out-of-Cycle-Security-Bulletin-Junos-OS-Evolved-PTX-Series-A-vulnerability-allows-a-unauthenticated-network-based-attacker-to-execute-code-as-root-CVE-2026-21902

Risks

A PTX series router can get fully compromised and used by attackers to redirect traffic as it has the pivotal position as a router in a datacenter or internet service provider network. Attackers will target vulnerable instances as it can enable them to attack other interconnected systems. Exploitation of the vulnerability can have a high impact on the confidentiality, integrity and availability of the system.

Description

CVE-2026-21902 is an incorrect permission assignment for critical resources vulnerability in the on-box anomaly detection framework of Juniper Networks Junos OS Evolved. Unauthenticated attackers can exploit the vulnerability which can lead to remote code execution as the root user.

Recommended Actions

Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.

Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.

While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.

References

https://nvd.nist.gov/vuln/detail/CVE-2026-21902