CVE-2026-21914
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-01-15

Assigner: Juniper Networks, Inc.

Description
An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos). If an SRX Series device receives a specifically malformed GPRS Tunnelling Protocol (GTP) Modify Bearer Request message, a lock is acquired and never released. This results in other threads not being able to acquire a lock themselves, causing a watchdog timeout leading to FPC crash and restart. This issue leads to a complete traffic outage until the device has automatically recovered. This issue affects Junos OS on SRX Series: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S3, * 24.4 versions before 24.4R2-S2, * 25.2 versions before 25.2R1-S1, 25.2R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-01-15
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
juniper_networks junos_os to 22.4R3-S8 (exc)
juniper_networks junos_os to 23.2R2-S5 (exc)
juniper_networks junos_os to 23.4R2-S6 (exc)
juniper_networks junos_os to 24.2R2-S3 (exc)
juniper_networks junos_os to 24.4R2-S2 (exc)
juniper_networks junos_os to 25.2R1-S1 (exc)
juniper_networks junos_os to 25.2R2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-667 The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Locking issue in the GTP plugin of Juniper Networks Junos OS on SRX Series devices. An unauthenticated attacker can send a specially malformed GPRS Tunnelling Protocol (GTP) Modify Bearer Request message that causes a lock to be acquired and never released. This prevents other threads from acquiring the lock, leading to a watchdog timeout, which causes the FPC (Flexible PIC Concentrator) to crash and restart.


How can this vulnerability impact me? :

The impact of this vulnerability is a Denial-of-Service (DoS) condition. When exploited, it causes the affected device to experience a complete traffic outage until it automatically recovers from the FPC crash and restart. This means network services relying on the SRX Series device could be disrupted temporarily.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart