CVE-2026-21919
Received Received - Intake
Incorrect Synchronization in Junos mgd Causes Management Plane DoS

Publication date: 2026-04-09

Last updated on: 2026-04-17

Assigner: Juniper Networks, Inc.

Description
An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane. When NETCONF sessions are quickly established and disconnected, a locking issue causes mgd processes to hang in an unusable state. When the maximum number of mgd processes has been reached, no new logins are possible. This leads to the inability to manage the device and requires a power-cycle to recover. This issue can be monitored by checking for mgd processes in lockf state in the output of 'show system processes extensive': user@host> show system processes extensive | match mgd <pid> root Β  Β  Β  20 Β  0 501M 4640K lockf Β  1 0:01 0.00% mgd If the system still can be accessed (either via the CLI or as root, which might still be possible as last resort as this won't invoke mgd), mgd processes in this state can be killed with 'request system process terminate <PID>' from the CLI or with 'kill -9 <PID>' from the shell.Β  This issue affects: Junos OS: * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2-S1, * 24.4 versions before 24.4R1-S3, 24.4R2; This issue does not affect Junos OS versions before 23.4R1; Junos OS Evolved: * 23.4 versions before 23.4R2-S5-EVO, * 24.2 versions before 24.2R2-S1-EVO, * 24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO. This issue does not affect Junos OS Evolved versions before 23.4R1-EVO;
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 34 associated CPEs
Vendor Product Version / Range
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 24.2
juniper junos 24.2
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 24.2
juniper junos 24.2
juniper junos 24.2
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos_os_evolved 24.2
juniper junos_os_evolved 24.2
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 23.4
juniper junos_os_evolved 24.2
juniper junos_os_evolved 24.2
juniper junos_os_evolved 24.4
juniper junos_os_evolved 24.4
juniper junos_os_evolved 24.4
juniper junos_os_evolved 24.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-821 The product utilizes a shared resource in a concurrent manner, but it does not correctly synchronize access to the resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Incorrect Synchronization issue in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved. It allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane.

The problem occurs when NETCONF sessions are quickly established and disconnected, causing a locking issue that makes mgd processes hang in an unusable state. Once the maximum number of mgd processes is reached, no new logins are possible, preventing management of the device until it is power-cycled.


How can this vulnerability impact me? :

This vulnerability can cause a complete Denial-of-Service (DoS) of the management plane on affected Junos OS and Junos OS Evolved devices.

As a result, you will be unable to manage the device remotely or locally through the management daemon until the device is power-cycled or the hung mgd processes are manually terminated if possible.

This can lead to operational disruptions and increased downtime, especially if the device is critical to your network infrastructure.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for mgd processes in a lockf state on the affected device.

You can use the following command to check for mgd processes in the lockf state:

  • show system processes extensive | match mgd

If mgd processes are found in the lockf state, it indicates the presence of the issue.


What immediate steps should I take to mitigate this vulnerability?

If the system is still accessible, you can mitigate the issue by terminating the mgd processes that are in the lockf state.

You can terminate these processes using either of the following commands:

  • From the CLI: request system process terminate <PID>
  • From the shell: kill -9 <PID>

If the maximum number of mgd processes has been reached and no new logins are possible, a power-cycle of the device may be required to recover.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart