CVE-2026-21921
EUVD-2026-269315.01.2026, 21:16
A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS). When telemetry collectors are frequently subscribing and unsubscribing to sensors continuously over a long period of time, telemetry-capable processes like chassisd, rpd or mib2d will crash and restart, which - depending on the process - can cause a complete outage until the system has recovered. This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-EVO.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos | 𝑥 < 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4:r1 |
| juniper | junos | 22.4:r1-s1 |
| juniper | junos | 22.4:r1-s2 |
| juniper | junos | 22.4:r2 |
| juniper | junos | 22.4:r2-s1 |
| juniper | junos | 22.4:r2-s2 |
| juniper | junos | 22.4:r3 |
| juniper | junos | 22.4:r3-s1 |
| juniper | junos | 22.4:r3-s2 |
| juniper | junos | 22.4:r3-s3 |
| juniper | junos | 22.4:r3-s4 |
| juniper | junos | 22.4:r3-s5 |
| juniper | junos | 22.4:r3-s6 |
| juniper | junos | 22.4:r3-s7 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2:r1 |
| juniper | junos | 23.2:r1-s1 |
| juniper | junos | 23.2:r1-s2 |
| juniper | junos | 23.2:r2 |
| juniper | junos | 23.2:r2-s1 |
| juniper | junos | 23.2:r2-s2 |
| juniper | junos | 23.2:r2-s3 |
| juniper | junos | 23.2:r2-s4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4:r1 |
| juniper | junos | 23.4:r1-s1 |
| juniper | junos | 23.4:r1-s2 |
| juniper | junos_os_evolved | 𝑥 < 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4:r1 |
| juniper | junos_os_evolved | 22.4:r1-s1 |
| juniper | junos_os_evolved | 22.4:r1-s2 |
| juniper | junos_os_evolved | 22.4:r2 |
| juniper | junos_os_evolved | 22.4:r2-s1 |
| juniper | junos_os_evolved | 22.4:r2-s2 |
| juniper | junos_os_evolved | 22.4:r3 |
| juniper | junos_os_evolved | 22.4:r3-s1 |
| juniper | junos_os_evolved | 22.4:r3-s2 |
| juniper | junos_os_evolved | 22.4:r3-s3 |
| juniper | junos_os_evolved | 22.4:r3-s4 |
| juniper | junos_os_evolved | 22.4:r3-s5 |
| juniper | junos_os_evolved | 22.4:r3-s6 |
| juniper | junos_os_evolved | 22.4:r3-s7 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2:r1 |
| juniper | junos_os_evolved | 23.2:r1-s1 |
| juniper | junos_os_evolved | 23.2:r1-s2 |
| juniper | junos_os_evolved | 23.2:r2 |
| juniper | junos_os_evolved | 23.2:r2-s1 |
| juniper | junos_os_evolved | 23.2:r2-s2 |
| juniper | junos_os_evolved | 23.2:r2-s3 |
| juniper | junos_os_evolved | 23.2:r2-s4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4:r1 |
| juniper | junos_os_evolved | 23.4:r1-s1 |
| juniper | junos_os_evolved | 23.4:r1-s2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration