Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCritical Juniper Networks PTX Flaw Allows Full Router Takeover
Critical Juniper Networks PTX Flaw Allows Full Router Takeover
CybersecurityDefenseTelecomHardware

Critical Juniper Networks PTX Flaw Allows Full Router Takeover

•February 26, 2026
0
BleepingComputer
BleepingComputer•Feb 26, 2026

Why It Matters

Compromise of PTX core routers could disrupt ISP and cloud traffic, exposing a high‑value attack surface for nation‑state and criminal actors.

Key Takeaways

  • •Unauthenticated attacker can gain root on PTX routers
  • •Vulnerability exists in On‑Box Anomaly Detection framework
  • •Affected Junos OS Evolved versions before 25.4R1‑S1‑EVO
  • •Patch available; apply or restrict access via ACLs
  • •Past Juniper exploits highlight high‑value target status

Pulse Analysis

The newly disclosed CVE‑2026‑21902 targets the On‑Box Anomaly Detection component of Junos OS Evolved on Juniper’s PTX Series routers. By exposing a service that runs with root privileges on an externally reachable port, an unauthenticated adversary can inject arbitrary code and seize full control of the device. PTX routers form the backbone of many ISP, carrier‑grade, and cloud networks, delivering multi‑terabit throughput with low latency. Compromise of such infrastructure could disrupt traffic routing, expose customer data, and provide a foothold for broader network infiltration.

Juniper’s advisory limits the exposure to Evo releases prior to 25.4R1‑S1‑EVO, 25.4R2‑EVO and 26.2R1‑EVO, while legacy non‑Evo firmware remains unaffected. The vendor has issued patches for the vulnerable branches and recommends immediate installation. Where patching cannot be performed, administrators should block the offending interface with firewall filters or ACLs and optionally disable the anomaly service via ‘request pfe anomalies disable’. These mitigations reduce the attack surface, but they also require careful change‑control procedures to avoid service interruption on high‑capacity routing platforms.

The PTX flaw arrives amid a pattern of sophisticated attacks on Juniper equipment, from the “J‑magic” VPN campaign to Mirai‑driven DDoS enlistments. Such incidents underscore the strategic value of carrier‑grade routers to nation‑state actors and cybercriminals alike. Organizations that rely on Juniper’s core routing must adopt continuous vulnerability scanning, enforce strict network segmentation, and maintain an up‑to‑date firmware lifecycle. Proactive posture not only safeguards bandwidth‑critical services but also preserves trust in the broader internet ecosystem that depends on resilient routing infrastructure.

Critical Juniper Networks PTX flaw allows full router takeover

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...