CVE-2026-21917
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper_networks | junos_os | From 23.2R2-S2 (inc) to 23.2R2-S5 (exc) |
| juniper_networks | junos_os | From 23.4R2-S1 (inc) to 23.4R2-S5 (exc) |
| juniper_networks | junos_os | to 24.2R2-S2 (exc) |
| juniper_networks | junos_os | to 24.4R1-S3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1286 | The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper validation of syntactic correctness of input in the Web-Filtering module of Juniper Networks Junos OS on SRX Series devices. An unauthenticated attacker can send a specifically malformed SSL packet to an SRX device configured for UTM Web-Filtering, causing the device's FPC (Flexible PIC Concentrator) to crash and restart, resulting in a Denial-of-Service (DoS).
How can this vulnerability impact me? :
The vulnerability can cause a Denial-of-Service (DoS) on affected Junos OS SRX Series devices. This means that an attacker can disrupt network services by causing the device to crash and restart, potentially leading to network downtime and loss of availability.