A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker authenticated with low privileges to cause a Denial-of-Service (DoS).
When telemetry collectors are frequently subscribing and unsubscribing to sensors continuously over a long period of time, telemetry-capable processes like chassisd, rpd or mib2d will crash and restart, which - depending on the process - can cause a complete outage until the system has recovered.
This issue affects:
Junos OS:
* all versions before 22.4R3-S8,
* 23.2 versions before 23.2R2-S5,
* 23.4 versions before 23.4R2;
Junos OS Evolved:
* all versions before 22.4R3-S8-EVO,
* 23.2 versions before 23.2R2-S5-EVO,
* 23.4 versions before 23.4R2-EVO.
References
| Link | Resource |
|---|---|
| https://kb.juniper.net/JSA106021 | Vendor Advisory |
| https://supportportal.juniper.net/JSA106021 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-15 21:16
Updated : 2026-01-23 18:52
NVD link : CVE-2026-21921
Mitre link : CVE-2026-21921
CVE.ORG link : CVE-2026-21921
JSON object : View
Products Affected
juniper
- junos
- junos_os_evolved
CWE
CWE-416
Use After Free
