CVE-2026-21914

EUVD-2026-2683
An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos).

If an SRX Series device receives a specifically malformed GPRS Tunnelling Protocol (GTP) Modify Bearer Request message, a lock is acquired and never released. This results in other threads not being able to acquire a lock themselves, causing a watchdog timeout leading to FPC crash and restart. This issue leads to a complete traffic outage until the device has automatically recovered.

This issue affects Junos OS on SRX Series:

  *  all versions before 22.4R3-S8,
  *  23.2 versions before 23.2R2-S5,
  *  23.4 versions before 23.4R2-S6,
  *  24.2 versions before 24.2R2-S3,
  *  24.4 versions before 24.4R2-S2,
  *  25.2 versions before 25.2R1-S1, 25.2R2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
Affected Products (NVD)
VendorProductVersion
juniperjunos
𝑥
< 22.4
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
juniperjunos
22.4:r3
juniperjunos
22.4:r3-s1
juniperjunos
22.4:r3-s2
juniperjunos
22.4:r3-s3
juniperjunos
22.4:r3-s4
juniperjunos
22.4:r3-s5
juniperjunos
22.4:r3-s6
juniperjunos
22.4:r3-s7
juniperjunos
23.2
juniperjunos
23.2:r1
juniperjunos
23.2:r1-s1
juniperjunos
23.2:r1-s2
juniperjunos
23.2:r2
juniperjunos
23.2:r2-s1
juniperjunos
23.2:r2-s2
juniperjunos
23.2:r2-s3
juniperjunos
23.2:r2-s4
juniperjunos
23.4
juniperjunos
23.4:r1
juniperjunos
23.4:r1-s1
juniperjunos
23.4:r1-s2
juniperjunos
23.4:r2
juniperjunos
23.4:r2-s1
juniperjunos
23.4:r2-s2
juniperjunos
23.4:r2-s3
juniperjunos
23.4:r2-s4
juniperjunos
23.4:r2-s5
juniperjunos
24.2
juniperjunos
24.2:r1
juniperjunos
24.2:r1-s1
juniperjunos
24.2:r1-s2
juniperjunos
24.2:r2
juniperjunos
24.2:r2-s1
juniperjunos
24.2:r2-s2
juniperjunos
24.4
juniperjunos
24.4:r1
juniperjunos
24.4:r1-s2
juniperjunos
24.4:r1-s3
juniperjunos
24.4:r2
juniperjunos
24.4:r2-s1
juniperjunos
25.2
juniperjunos
25.2:r1
juniperjunos
25.2:r2
𝑥
= Vulnerable software versions