

Affected Environment
Junos OS Evolved running on Juniper PTX Series routers is affected.
These routers are widely used in ISP, telecom, and cloud networks.
Threat Overview
CVE-2026-21902 is rated critical and enables remote code execution as root.
An unauthenticated attacker can fully compromise vulnerable routers.
Exposure Timeline
The issue was disclosed and documented on 2026-02-26.
Exposure persists until affected PTX systems are identified and patched.
Attack Surface
The flaw sits in the On-Box Anomaly detection framework on PTX routers.
It becomes reachable over the network where the service is exposed.
Technical Root Cause
Incorrect permission assignment for a critical resource in Junos OS Evolved.
The anomaly detection service is accessible beyond intended internal use.
Exploitation Pathway
A network-based attacker reaches the anomaly detection service remotely.
They can manipulate it to execute arbitrary code with root privileges.
Operational Impact
A successful attack allows complete router takeover by an adversary.
Attackers could control traffic handling and undermine network reliability.
Strategic Impact
Compromise of PTX core routers can affect key government and business networks.
Loss of network integrity can disrupt services and erode stakeholder trust.
Required Mitigation
Identify PTX routers running vulnerable Junos OS Evolved versions.
Apply Juniper’s fixed releases (25.4R1-S1-EVO or 25.4R2-EVO) after testing.
Incident Response Guidance
Prioritise vulnerability scanning of externally exposed PTX assets.
If compromise is suspected, isolate affected routers and follow IR procedures.
References
Use vendor and official sources to confirm status and fixes for CVE-2026-21902.
Key references: Juniper security bulletin, NVD entry, and public reporting.
Trusted by clients worldwide






Led by human expertise and powered by the VisionX platform, we provide you with a 24/7 unbeatable Managed Detection & Response capability giving you transparent and consolidated security solutions.




