DEV Community

DeepSeaX
DeepSeaX

Posted on

CVE-2026-21902: Juniper PTX Routers — One Packet to Root (CVSS 9.8)

The Vulnerability That Could Take Down Your Backbone

Juniper Networks just dropped an out-of-cycle security bulletin for CVE-2026-21902 — a CVSS 9.8 critical vulnerability in Junos OS Evolved running on PTX Series routers. An unauthenticated, network-based attacker can execute arbitrary code as root. No credentials needed. No user interaction required.

PTX routers sit at the core of ISP backbones, data center interconnects, and enterprise WAN edges. A single compromised PTX can cascade into a full network outage.

What Went Wrong

The vulnerability lives in the On-Box Anomaly Detection framework — ironically, a security feature. The framework was designed to be accessible only by internal processes, but a permissions misconfiguration (CWE-276: Incorrect Default Permissions) exposed it on an externally reachable port.

The attack flow:

Attacker → External Port → Anomaly Detection Framework → Code Execution as root
Enter fullscreen mode Exit fullscreen mode

No exploit chain needed. No privilege escalation. Straight to root in one step.

Affected Versions

Status Version
Vulnerable Junos OS Evolved < 25.4R1-S1-EVO
Vulnerable Junos OS Evolved < 25.4R2-EVO
Patched 25.4R1-S1-EVO
Patched 25.4R2-EVO
Patched 26.2R1-EVO

Only PTX Series routers running Junos OS Evolved are affected. Standard Junos OS and other router families (MX, SRX, EX) are not vulnerable.

MITRE ATT&CK Mapping

Tactic Technique Description
Initial Access T1190 Exploit Public-Facing Application
Execution T1059 Command execution as root
Persistence T1542 Firmware-level persistence possible
Impact T1489 Service disruption via routing manipulation

Detection: How to Know If You're Exposed

1. Identify PTX Assets

# Find all Juniper PTX in your CMDB/network inventory
nmap -sV --script=banner -p 22,830,3000 <management-subnet>
# Look for: Junos OS Evolved on PTX Series
Enter fullscreen mode Exit fullscreen mode

2. Check Current Version

show version | match "Junos version"
# If < 25.4R1-S1-EVO → VULNERABLE
Enter fullscreen mode Exit fullscreen mode

3. Network-Level Detection

Monitor for unexpected connections to the Anomaly Detection framework port:

# Firewall rule audit — this port should NOT be externally accessible
show firewall filter | match anomaly
show system connections | match ESTABLISHED | except 127.0.0.1
Enter fullscreen mode Exit fullscreen mode

4. Sigma Rule

title: Juniper PTX Anomaly Detection Exploitation Attempt
status: experimental
logsource:
  product: juniper
  service: system
detection:
  selection:
    - event_id: "RT_FLOW_SESSION_CREATE"
    - dst_port: [anomaly_detection_port]
    - src_zone: "untrust"
  condition: selection
level: critical
Enter fullscreen mode Exit fullscreen mode

Immediate Actions

If you can patch now:

  • Upgrade to 25.4R1-S1-EVO, 25.4R2-EVO, or 26.2R1-EVO
  • Verify with show version post-upgrade

If you cannot patch immediately:

  • Apply firewall filters to restrict access to the vulnerable port
  • Limit management plane access via ACLs
  • Monitor for anomalous connections from untrusted sources
set firewall family inet filter PROTECT-MGMT term BLOCK-ANOMALY from source-address 0.0.0.0/0
set firewall family inet filter PROTECT-MGMT term BLOCK-ANOMALY then discard
Enter fullscreen mode Exit fullscreen mode

Why This Matters

This isn't just another router CVE. Consider the blast radius:

  • ISPs: PTX routers carry backbone traffic. One compromised router = routing table manipulation = traffic blackholing or interception across regions
  • Data Centers: PTX handles DC interconnect fabric. Root access = east-west traffic visibility
  • Enterprises: SD-WAN edge PTX = gateway to all branch traffic

Juniper SIRT says no active exploitation has been observed yet. But with CVSS 9.8 and a straightforward attack vector, the clock is ticking. Patch or mitigate today.

Key Takeaways

  1. Security features can be attack surfaces — the Anomaly Detection framework was meant to protect, but its misconfigured permissions became the vulnerability
  2. Out-of-cycle bulletins mean urgency — Juniper didn't wait for the next scheduled advisory
  3. Network infrastructure is high-value — root on a backbone router is worth more than root on 100 workstations
  4. ACLs are your safety net — management plane isolation should be default, not optional

Need help assessing your exposure? Request a free penetration test — currently in open beta.

Top comments (0)