CVE-2026-21909
Gravedad CVSS v4.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/01/2026
Última modificación:
15/01/2026
Descripción
*** Pendiente de traducción *** A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker controlling an adjacent IS-IS neighbor to send a specific update packet causing a memory leak. Continued receipt and processing of these packets will exhaust all available memory, crashing rpd and creating a Denial of Service (DoS) condition.<br />
<br />
Memory usage can be monitored through the use of the &#39;show task memory detail&#39; command. For example:<br />
<br />
user@junos> show task memory detail | match ted-infra<br />
TED-INFRA-COOKIE 25 1072 28 1184 229<br />
<br />
<br />
<br />
user@junos> <br />
<br />
show task memory detail | match ted-infra<br />
TED-INFRA-COOKIE 31 1360 34 1472 307<br />
<br />
This issue affects:<br />
<br />
Junos OS: <br />
<br />
* from 23.2 before 23.2R2, <br />
* from 23.4 before 23.4R1-S2, 23.4R2, <br />
* from 24.1 before 24.1R2; <br />
<br />
<br />
Junos OS Evolved: <br />
<br />
* from 23.2 before 23.2R2-EVO, <br />
* from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO, <br />
* from 24.1 before 24.1R2-EVO.<br />
<br />
<br />
This issue does not affect Junos OS versions before 23.2R1 or Junos OS Evolved versions before 23.2R1-EVO.
Impacto
Puntuación base 4.0
7.10
Gravedad 4.0
ALTA
Puntuación base 3.x
6.50
Gravedad 3.x
MEDIA



