vulnerability
Juniper Junos OS: 2026-01 Security Bulletin: Junos OS: Receipt of a specifically malformed ICMP packet causes an FPC restart (JSA104294) (CVE-2026-0203)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:N/C:N/I:N/A:C) | Jan 14, 2026 | Jan 27, 2026 | Jan 27, 2026 |
Description
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS allows an unauthenticated, network-adjacent attacker sending a specifically malformed ICMP packet to cause an FPC to crash and restart, resulting in a Denial of Service (DoS).When an ICMP packet is received with a specifically malformed IP header value, the FPC receiving the packet crashes and restarts. Due to the specific type of malformed packet, adjacent upstream routers would not forward the packet, limiting the attack surface to adjacent networks.This issue only affects ICMPv4. ICMPv6 is not vulnerable to this issue.
Solution
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.