CVE-2026-21910
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-02-25

Assigner: Juniper Networks, Inc.

Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on EX4k Series and QFX5k Series platforms allows an unauthenticated network-adjacent attacker flapping an interface to cause traffic between VXLAN Network Identifiers (VNIs) to drop, leading to a Denial of Service (DoS). On all EX4k and QFX5k platforms, a link flap in an EVPN-VXLAN configuration Link Aggregation Group (LAG) results in Inter-VNI traffic dropping when there are multiple load-balanced next-hop routes for the same destination. This issue is only applicable to systems that support EVPN-VXLAN Virtual Port-Link Aggregation Groups (VPLAG), such as the QFX5110, QFX5120, QFX5200, EX4100, EX4300, EX4400, and EX4650. Service can only be restored by restarting the affected FPC via the 'request chassis fpc restart slot <slot-number>' command. This issue affects Junos OS on EX4k and QFX5k Series:  * all versions before 21.4R3-S12,  * all versions of 22.2 * from 22.4 before 22.4R3-S8,  * from 23.2 before 23.2R2-S5,  * from 23.4 before 23.4R2-S5,  * from 24.2 before 24.2R2-S3, * from 24.4 before 24.4R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-02-25
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 65 associated CPEs
Vendor Product Version / Range
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.4
juniper junos 21.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 21.4
juniper junos 23.2
juniper junos 22.4
juniper junos 21.4
juniper junos 23.2
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 21.4
juniper junos 21.4
juniper junos 23.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.4
juniper junos 23.2
juniper junos 24.2
juniper junos 24.2
juniper junos to 21.4 (exc)
juniper junos 23.4
juniper junos 21.4
juniper junos 21.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 24.2
juniper junos 24.2
juniper junos 21.4
juniper junos 21.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 24.2
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.2
juniper junos 24.2
juniper junos 22.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-754 The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper check for unusual or exceptional conditions in the packet forwarding engine of Juniper Networks Junos OS on EX4k and QFX5k Series platforms. It allows an unauthenticated network-adjacent attacker to cause an interface to flap, which leads to traffic between VXLAN Network Identifiers (VNIs) dropping. This results in a Denial of Service (DoS) condition. The issue occurs specifically in EVPN-VXLAN configurations using Link Aggregation Groups (LAG) when multiple load-balanced next-hop routes exist for the same destination. Service restoration requires restarting the affected FPC.


How can this vulnerability impact me? :

This vulnerability can cause a Denial of Service (DoS) by dropping traffic between VXLAN Network Identifiers (VNIs) when an attacker causes an interface to flap. This disrupts network communication on affected Juniper EX4k and QFX5k platforms configured with EVPN-VXLAN and Link Aggregation Groups, potentially impacting network availability and reliability until the affected FPC is restarted.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, you should restart the affected FPC using the command 'request chassis fpc restart slot <slot-number>'. Additionally, ensure your Junos OS version is updated to a fixed release version beyond the vulnerable ones listed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart