Cyber Posture

CVE-2026-21918

High

Published: 15 January 2026

Published
15 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21918 is a high-severity Double Free (CWE-415) vulnerability in Juniper Junos. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote unauthenticated packet sequence triggers double-free crash in public-facing flowd daemon (T1190), directly resulting in application/system DoS via exploitation (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX and MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). On all SRX and MX Series platforms, when during TCP…

more

session establishment a specific sequence of packets is encountered a double free happens. This causes flowd to crash and the respective FPC to restart. This issue affects Junos OS on SRX and MX Series: * all versions before 22.4R3-S7, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2.

Deeper analysisAI

CVE-2026-21918 is a Double Free vulnerability (CWE-415) in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX and MX Series platforms. The issue occurs when a specific sequence of packets is encountered during TCP session establishment, triggering a double free that causes flowd to crash and the respective Flexible PIC Concentrator (FPC) to restart. This affects all versions of Junos OS prior to 22.4R3-S7, 23.2 versions before 23.2R2-S3, 23.4 versions before 23.4R2-S4, and 24.2 versions before 24.2R2. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

An unauthenticated, network-based attacker can exploit this vulnerability by sending the specific sequence of packets during TCP session establishment to any affected SRX or MX Series device. Successful exploitation results in a Denial-of-Service (DoS) condition, as the flowd crash and FPC restart disrupt traffic processing on the targeted platform.

Juniper's security advisory JSA106018, available at kb.juniper.net/JSA106018 and supportportal.juniper.net/JSA106018, details the affected versions and recommends upgrading to a patched release such as Junos OS 22.4R3-S7 or later, 23.2R2-S3 or later, 23.4R2-S4 or later, or 24.2R2 or later to mitigate the issue.

Details

CWE(s)

Affected Products

juniper
junos
22.4, 23.2, 23.4, 24.2 · ≤ 22.4

CVEs Like This One

CVE-2026-21905Same product: Juniper Junos
CVE-2026-33778Same product: Juniper Junos
CVE-2026-21917Same product: Juniper Junos
CVE-2026-21914Same product: Juniper Junos
CVE-2026-21906Same product: Juniper Junos
CVE-2026-21920Same product: Juniper Junos
CVE-2026-33790Same product: Juniper Junos
CVE-2024-39564Same product: Juniper Junos
CVE-2026-33785Same product: Juniper Junos
CVE-2025-60003Same product: Juniper Junos

References