CVE-2026-21921

EUVD-2026-2693
A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS).

When telemetry collectors are frequently subscribing and unsubscribing to sensors continuously over a long period of time, telemetry-capable processes like chassisd, rpd or mib2d will crash and restart, which - depending on the process - can cause a complete outage until the system has recovered.

This issue affects:

 Junos OS: 



  *  all versions before 22.4R3-S8,
  *  23.2 versions before 23.2R2-S5,
  *  23.4 versions before 23.4R2;




Junos OS Evolved:



  *  all versions before 22.4R3-S8-EVO,
  *  23.2 versions before 23.2R2-S5-EVO,
  *  23.4 versions before 23.4R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
juniperCNA
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
Affected Products (NVD)
VendorProductVersion
juniperjunos
𝑥
< 22.4
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
juniperjunos
22.4:r3
juniperjunos
22.4:r3-s1
juniperjunos
22.4:r3-s2
juniperjunos
22.4:r3-s3
juniperjunos
22.4:r3-s4
juniperjunos
22.4:r3-s5
juniperjunos
22.4:r3-s6
juniperjunos
22.4:r3-s7
juniperjunos
23.2
juniperjunos
23.2:r1
juniperjunos
23.2:r1-s1
juniperjunos
23.2:r1-s2
juniperjunos
23.2:r2
juniperjunos
23.2:r2-s1
juniperjunos
23.2:r2-s2
juniperjunos
23.2:r2-s3
juniperjunos
23.2:r2-s4
juniperjunos
23.4
juniperjunos
23.4:r1
juniperjunos
23.4:r1-s1
juniperjunos
23.4:r1-s2
juniperjunos_os_evolved
𝑥
< 22.4
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
22.4:r3
juniperjunos_os_evolved
22.4:r3-s1
juniperjunos_os_evolved
22.4:r3-s2
juniperjunos_os_evolved
22.4:r3-s3
juniperjunos_os_evolved
22.4:r3-s4
juniperjunos_os_evolved
22.4:r3-s5
juniperjunos_os_evolved
22.4:r3-s6
juniperjunos_os_evolved
22.4:r3-s7
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r1-s2
juniperjunos_os_evolved
23.2:r2
juniperjunos_os_evolved
23.2:r2-s1
juniperjunos_os_evolved
23.2:r2-s2
juniperjunos_os_evolved
23.2:r2-s3
juniperjunos_os_evolved
23.2:r2-s4
juniperjunos_os_evolved
23.4
juniperjunos_os_evolved
23.4:r1
juniperjunos_os_evolved
23.4:r1-s1
juniperjunos_os_evolved
23.4:r1-s2
𝑥
= Vulnerable software versions