An Improper Validation of Syntactic Correctness of Input vulnerability in the Web-Filtering module of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
If an SRX device configured for UTM Web-Filtering receives a specifically malformed SSL packet, this will cause an FPC crash and restart.
This issue affects Junos OS on SRX Series:
* 23.2 versions from 23.2R2-S2 before 23.2R2-S5,
* 23.4 versions from 23.4R2-S1 before 23.4R2-S5,
* 24.2 versions before 24.2R2-S2,
* 24.4 versions before 24.4R1-S3, 24.4R2.
Earlier versions of Junos are also affected, but no fix is available.
References
| Link | Resource |
|---|---|
| https://kb.juniper.net/JSA105996 | Vendor Advisory |
| https://supportportal.juniper.net/JSA105996 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-15 21:16
Updated : 2026-01-23 19:41
NVD link : CVE-2026-21917
Mitre link : CVE-2026-21917
CVE.ORG link : CVE-2026-21917
JSON object : View
Products Affected
juniper
- srx380
- srx4120
- srx5400
- srx2300
- srx5800
- srx4600
- junos
- srx320
- srx340
- srx4200
- srx5600
- srx1600
- srx4700
- srx4300
- srx345
- srx1500
- srx4100
- srx300
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input
