A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX and MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On all SRX and MX Series platforms, when during TCP session establishment a specific sequence of packets is encountered a double free happens. This causes flowd to crash and the respective FPC to restart.
This issue affects Junos OS on SRX and MX Series:
* all versions before 22.4R3-S7,
* 23.2 versions before 23.2R2-S3,
* 23.4 versions before 23.4R2-S4,
* 24.2 versions before 24.2R2.
References
| Link | Resource |
|---|---|
| https://kb.juniper.net/JSA106018 | Vendor Advisory |
| https://supportportal.juniper.net/JSA106018 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-15 21:16
Updated : 2026-01-23 19:41
NVD link : CVE-2026-21918
Mitre link : CVE-2026-21918
CVE.ORG link : CVE-2026-21918
JSON object : View
Products Affected
juniper
- srx4120
- mx2020
- srx340
- mx480
- srx5600
- srx4700
- srx345
- srx380
- srx5400
- srx2300
- mx960
- srx4600
- junos
- srx320
- mx10008
- mx10004
- srx1500
- srx4300
- srx4200
- srx5800
- mx240
- srx4100
- srx300
- mx2010
- mx304
- mx2008
- mx204
- srx1600
CWE
CWE-415
Double Free
