vulnerability

Juniper Junos OS: 2026-01 Security Bulletin: Junos OS and Junos OS Evolved: Use after free vulnerability In 802.1X authentication daemon can cause crash of the dot1xd process (JSA106007) (CVE-2026-21908)

Severity
7
CVSS
(AV:A/AC:M/Au:S/C:C/I:C/A:C)
Published
Jan 14, 2026
Added
Jan 27, 2026
Modified
Feb 12, 2026

Description

A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, leading to a Denial of Service (DoS), or potentially execute arbitrary code within the context of the process running as root.The issue is specific to the processing of a change in authorization (CoA) when a port bounce occurs. A pointer is freed but was then referenced later in the same code path. Successful exploitation is outside the attacker's direct control due to the specific timing of the two events required to execute the vulnerable code path.This issue affects systems with 802.1X authentication port-based network access control (PNAC) enabled.

Solution

juniper-junos-os-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.