7.1

CVE-2026-21919

Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting NETCONF sessions causes management unavailability

An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane.

When NETCONF sessions are quickly established and disconnected, a locking issue causes mgd processes to hang in an unusable state. When the maximum number of mgd processes has been reached, no new logins are possible. This leads to the inability to manage the device and requires a power-cycle to recover.

This issue can be monitored by checking for mgd processes in lockf state in the output of 'show system processes extensive':

user@host> show system processes extensive | match mgd
<pid> root         20    0   501M  4640K lockf    1   0:01   0.00% mgd


If the system still can be accessed (either via the CLI or as root, which might still be possible as last resort as this won't invoke mgd), mgd processes in this state can be killed with 'request system process terminate <PID>' from the CLI or with 'kill -9 <PID>' from the shell. 




This issue affects:

Junos OS:

  *  23.4 versions before 23.4R2-S4,
  *  24.2 versions before 24.2R2-S1,
  *  24.4 versions before 24.4R1-S3, 24.4R2;




This issue does not affect Junos OS versions before 23.4R1;



Junos OS Evolved:

  *  23.4 versions before 23.4R2-S5-EVO,
  *  24.2 versions before 24.2R2-S1-EVO,
  *  24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO.






This issue does not affect Junos OS Evolved versions before 23.4R1-EVO;
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version23.4 Update-
JuniperJunos Version23.4 Updater1
JuniperJunos Version23.4 Updater1-s1
JuniperJunos Version23.4 Updater1-s2
JuniperJunos Version23.4 Updater2
JuniperJunos Version23.4 Updater2-s1
JuniperJunos Version23.4 Updater2-s2
JuniperJunos Version23.4 Updater2-s3
JuniperJunos Version24.2 Update-
JuniperJunos Version24.2 Updater1
JuniperJunos Version24.2 Updater1-s1
JuniperJunos Version24.2 Updater1-s2
JuniperJunos Version24.2 Updater2
JuniperJunos Version24.4 Update-
JuniperJunos Version24.4 Updater1
JuniperJunos Version24.4 Updater1-s2
JuniperJunos Version24.4 Updater2
JuniperJunos Os Evolved Version23.4 Update-
JuniperJunos Os Evolved Version23.4 Updater1
JuniperJunos Os Evolved Version23.4 Updater1-s1
JuniperJunos Os Evolved Version23.4 Updater1-s2
JuniperJunos Os Evolved Version23.4 Updater2
JuniperJunos Os Evolved Version23.4 Updater2-s1
JuniperJunos Os Evolved Version23.4 Updater2-s2
JuniperJunos Os Evolved Version23.4 Updater2-s3
JuniperJunos Os Evolved Version23.4 Updater2-s4
JuniperJunos Os Evolved Version24.2 Update-
JuniperJunos Os Evolved Version24.2 Updater1
JuniperJunos Os Evolved Version24.2 Updater1-s2
JuniperJunos Os Evolved Version24.2 Updater2
JuniperJunos Os Evolved Version24.4 Update-
JuniperJunos Os Evolved Version24.4 Updater1
JuniperJunos Os Evolved Version24.4 Updater1-s2
JuniperJunos Os Evolved Version24.4 Updater2
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.16
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
sirt@juniper.net 7.1 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X
CWE-821 Incorrect Synchronization

The product utilizes a shared resource in a concurrent manner, but it does not correctly synchronize access to the resource.