7.5

CVE-2026-21908

A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, leading to a Denial of Service (DoS), or potentially execute arbitrary code within the context of the process running as root.

The issue is specific to the processing of a change in authorization (CoA) when a port bounce occurs. A pointer is freed but was then referenced later in the same code path. Successful exploitation is outside the attacker's direct control due to the specific timing of the two events required to execute the vulnerable code path.

This issue affects systems with 802.1X authentication port-based network access control (PNAC) enabled.
This issue affects:

Junos OS: 



  *  from 23.2R2-S1 before 23.2R2-S5, 
  *  from 23.4R2 before 23.4R2-S6, 
  *  from 24.2 before 24.2R2-S3, 
  *  from 24.4 before 24.4R2-S1, 
  *  from 25.2 before 25.2R1-S2, 25.2R2; 




Junos OS Evolved: 



  *  from 23.2R2-S1 before 23.2R2-S5-EVO, 
  *  from 23.4R2 before 23.4R2-S6-EVO, 
  *  from 24.2 before 24.2R2-S3-EVO, 
  *  from 24.4 before 24.4R2-S1-EVO, 
  *  from 25.2 before 25.2R1-S2-EVO, 25.2R2-EVO.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version23.2 Updater2-s1
JuniperJunos Version23.2 Updater2-s2
JuniperJunos Version23.2 Updater2-s3
JuniperJunos Version23.2 Updater2-s4
JuniperJunos Version23.4 Updater2
JuniperJunos Version23.4 Updater2-s1
JuniperJunos Version23.4 Updater2-s2
JuniperJunos Version23.4 Updater2-s3
JuniperJunos Version23.4 Updater2-s4
JuniperJunos Version23.4 Updater2-s5
JuniperJunos Version24.2 Update-
JuniperJunos Version24.2 Updater1
JuniperJunos Version24.2 Updater1-s1
JuniperJunos Version24.2 Updater1-s2
JuniperJunos Version24.2 Updater2
JuniperJunos Version24.2 Updater2-s1
JuniperJunos Version24.2 Updater2-s2
JuniperJunos Version24.4 Update-
JuniperJunos Version24.4 Updater1
JuniperJunos Version24.4 Updater1-s2
JuniperJunos Version24.4 Updater1-s3
JuniperJunos Version24.4 Updater2
JuniperJunos Version25.2 Update-
JuniperJunos Version25.2 Updater1
JuniperJunos Version25.2 Updater1-s1
JuniperJunos Version25.2 Updater2
JuniperJunos Os Evolved Version23.2 Updater2-s1
JuniperJunos Os Evolved Version23.2 Updater2-s2
JuniperJunos Os Evolved Version23.2 Updater2-s3
JuniperJunos Os Evolved Version23.2 Updater2-s4
JuniperJunos Os Evolved Version23.4 Updater2
JuniperJunos Os Evolved Version23.4 Updater2-s1
JuniperJunos Os Evolved Version23.4 Updater2-s2
JuniperJunos Os Evolved Version23.4 Updater2-s3
JuniperJunos Os Evolved Version23.4 Updater2-s4
JuniperJunos Os Evolved Version23.4 Updater2-s5
JuniperJunos Os Evolved Version24.2 Update-
JuniperJunos Os Evolved Version24.2 Updater1
JuniperJunos Os Evolved Version24.2 Updater1-s2
JuniperJunos Os Evolved Version24.2 Updater2
JuniperJunos Os Evolved Version24.2 Updater2-s1
JuniperJunos Os Evolved Version24.2 Updater2-s2
JuniperJunos Os Evolved Version24.4 Update-
JuniperJunos Os Evolved Version24.4 Updater1
JuniperJunos Os Evolved Version24.4 Updater1-s2
JuniperJunos Os Evolved Version24.4 Updater1-s3
JuniperJunos Os Evolved Version24.4 Updater2
JuniperJunos Os Evolved Version25.2 Update-
JuniperJunos Os Evolved Version25.2 Updater1
JuniperJunos Os Evolved Version25.2 Updater1-s1
JuniperJunos Os Evolved Version25.2 Updater2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.12
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 7.1 1.2 5.9
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
sirt@juniper.net 7.5 0 0
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:M/U:Green
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.