CVE-2026-21908
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junoss | to 23.2r2-s5 (exc) |
| juniper | junoss | to 23.4r2-s6 (exc) |
| juniper | junoss | to 24.2r2-s3 (exc) |
| juniper | junoss | to 24.4r2-s1 (exc) |
| juniper | junoss | to 25.2r1-s2 (exc) |
| juniper | junoss | From 25.2r2 (inc) |
| juniper | junosevolved | to 23.2r2-s5-evo (exc) |
| juniper | junosevolved | to 23.4r2-s6-evo (exc) |
| juniper | junosevolved | to 24.2r2-s3-evo (exc) |
| juniper | junosevolved | to 24.4r2-s1-evo (exc) |
| juniper | junosevolved | to 25.2r1-s2-evo (exc) |
| juniper | junosevolved | From 25.2r2-evo (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Use After Free issue in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved. It occurs when a pointer is freed but then later referenced during the processing of a change in authorization (CoA) triggered by a port bounce. An authenticated, network-adjacent attacker who repeatedly flaps a port could exploit this flaw to crash the dot1xd process, causing a Denial of Service (DoS), or potentially execute arbitrary code with root privileges. However, successful exploitation requires precise timing of events and is not fully under the attacker's control.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an authenticated, network-adjacent attacker to cause a Denial of Service (DoS) by crashing the 802.1X authentication daemon (dot1xd). In a worst-case scenario, the attacker might also execute arbitrary code with root privileges, potentially compromising the affected system's security and control.