Incorrect Permission Assignment Vulnerability in Juniper Networks Junos OS Evolved on PTX Series
CVE-2026-21902

9.3CRITICAL

Key Information:

Vendor
CVE Published:
25 February 2026

Badges

๐Ÿ“ˆ Score: 635๐Ÿ‘พ Exploit Exists

What is CVE-2026-21902?

CVE-2026-21902 is a critical vulnerability found in Juniper Networks' Junos OS Evolved, specifically impacting the PTX Series of network devices. This flaw arises from an improper permission assignment within the On-Box Anomaly Detection Framework, which is designed to monitor and detect abnormal behavior in network traffic. Due to this vulnerability, an unauthenticated, network-based attacker has the potential to execute code with root privileges, which could lead to unauthorized access and control over the affected devices. Since the service is enabled by default and accessible through external ports, the risk of exploitation is heightened, allowing attackers to manipulate system functions maliciously without requiring specific configurations. This vulnerability affects several versions of Junos OS Evolved; therefore, organizations using these devices are urged to take immediate action to safeguard their network.

Potential impact of CVE-2026-21902

  1. Complete Device Compromise: The vulnerability allows an attacker to execute code as a root user, enabling them to gain full control of the network device. This potentially allows for the manipulation of network traffic, unauthorized data access, and the alteration or deletion of critical configurations.

  2. Network Intrusion and Data Breaches: Once an attacker gains control over the device, they can potentially infiltrate the broader network infrastructure. This could lead to data breaches, where sensitive information could be exfiltrated or tampered with, posing severe risks to organizational integrity and compliance with data protection regulations.

  3. Service Disruption and Downtime: Exploitation of the vulnerability may enable attackers to disrupt network services. This could lead to significant operational downtime, impacting critical business functions and resulting in potential revenue loss and reputational damage for affected organizations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Junos OS Evolved PTX Series 25.4 < 25.4R1-S1-EVO, 25.4R2-EVO

Junos OS Evolved PTX Series 0 < 25.4R1-EVO

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.