Critical Juniper Networks RCE CVE-2026-21902

UpGuard Team
UpGuard Team
February 26, 2026

Key Facts: Juniper Networks vulnerability

  • Initial Discovery: February 2026
  • Public Advisory Date: February 26, 2026
  • Vulnerability ID: CVE-2026-21902
  • Target System: Junos OS Evolved (PTX Series Routers)
  • Vulnerability Type: Improper Permission Assignment / Unauthenticated Remote Code Execution (RCE)
  • Severity: Critical (CVSS Score: 9.8)
  • Status: Patched; Updates released for versions 25.4 and 26.2.

What is the Juniper Networks vulnerability?

On February 26, 2026, Juniper Networks issued a formal security advisory regarding a critical technical flaw within its Junos OS Evolved operating system. It is important to note that this is a vulnerability disclosure, not a confirmed data breach of corporate records.

The issue centers on CVE-2026-21902, an improper permission assignment flaw within the "On-Box Anomaly Detection" framework. Due to a configuration error, this framework was inadvertently exposed via an external port rather than being restricted to internal processes. This allows an unauthenticated attacker to bypass security boundaries and execute malicious commands with root privileges over a network.

What systems are affected?

The vulnerability specifically impacts Juniper PTX Series routers running specific versions of Junos OS Evolved. The flaw is rooted in the platform's anomaly detection module, where incorrect port exposure allows for remote exploitation without a valid username or password.

According to the official advisory, the following release families and versions are primarily affected:

Release Family Status Fixed Version
Junos OS Evolved 25.4 Affected 25.4R1-S1-EVO / 25.4R2-EVO
Junos OS Evolved 26.2 Affected 26.2R1-EVO or later
Other Versions Vulnerable All versions prior to 25.4

Organizations utilizing these high-performance routers for core networking, data center interconnects, or service provider peering are advised to verify their patch level immediately.

Potential impact for organizations

For organizations utilizing affected Juniper hardware, an unpatched instance of CVE-2026-21902 presents severe infrastructure risks. Because the flaw allows for execution without requiring authentication, a malicious actor could:

  • Gain Full System Control: Execute unauthorized commands at the root level to modify routing tables or intercept traffic.
  • Network Disruption: Trigger a complete shutdown of core routing functions, leading to widespread service outages.
  • Lateral Movement: Use the compromised router as a persistent "beachhead" to scan and attack other sensitive areas of the internal corporate or provider network.
  • Data Interception: While no data theft has been reported, root access allows for the potential mirroring of traffic or extraction of sensitive configuration files.

How to secure your environment

  • Apply Security Updates: Immediately update PTX Series hardware to the fixed versions (25.4R1-S1-EVO, 25.4R2-EVO, or 26.2R1-EVO).
  • Disable Unused Services: If the 'On-Box Anomaly Detection' feature is not required for your workflow, ensure the associated ports are disabled or blocked at the edge.
  • Restrict Management Access: Implement firewall filters (ACLs) to ensure that management frameworks are only accessible via trusted, internal IP ranges (Out-of-Band management).
  • Audit System Logs: Review logs for any unusual connection attempts to external-facing ports associated with the anomaly detection framework.

Frequently Asked Questions

What is CVE-2026-21902?

It is a critical vulnerability in Juniper's Junos OS Evolved that allows for "unauthenticated remote code execution." This means an attacker can take over a router without needing a password.

Is my personal data at risk?

This is a technical infrastructure vulnerability. While it could theoretically lead to traffic interception, there are currently no reports of individual user data (like personal emails or passwords) being compromised.

What systems were impacted?

The vulnerability impacts Juniper PTX Series routers running Junos OS Evolved. Specifically, the flaw resides in the 'On-Box Anomaly Detection' component, which failed to properly restrict external network access.

What should I do if my company uses Juniper?

Individual employees do not need to take action. This is a hardware-level security update handled by Network Engineering and Security Departments. If you are a network administrator, you should verify your firmware version against the advisory immediately.

How secure is Juniper Networks?

Juniper Networks, now part of HPE, develops networking infrastructure and solutions including enterprise wired and wireless LAN systems, data center switching equipment, and SD-WAN routers. The company provides an AI-native networking platform called Mist that offers network operations management and automation capabilities.
  • Check icon
    View our free preliminary report on Juniper Networks’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
https://www.juniper.net
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.

Latest news

Stay up-to-date with the latest news in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating