CVE-2026-21909
Gravedad CVSS v4.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/01/2026
Última modificación:
23/01/2026
Descripción
*** Pendiente de traducción *** A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker controlling an adjacent IS-IS neighbor to send a specific update packet causing a memory leak. Continued receipt and processing of these packets will exhaust all available memory, crashing rpd and creating a Denial of Service (DoS) condition.<br />
<br />
Memory usage can be monitored through the use of the &#39;show task memory detail&#39; command. For example:<br />
<br />
user@junos> show task memory detail | match ted-infra<br />
TED-INFRA-COOKIE 25 1072 28 1184 229<br />
<br />
<br />
<br />
user@junos> <br />
<br />
show task memory detail | match ted-infra<br />
TED-INFRA-COOKIE 31 1360 34 1472 307<br />
<br />
This issue affects:<br />
<br />
Junos OS: <br />
<br />
* from 23.2 before 23.2R2, <br />
* from 23.4 before 23.4R1-S2, 23.4R2, <br />
* from 24.1 before 24.1R2; <br />
<br />
<br />
Junos OS Evolved: <br />
<br />
* from 23.2 before 23.2R2-EVO, <br />
* from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO, <br />
* from 24.1 before 24.1R2-EVO.<br />
<br />
<br />
This issue does not affect Junos OS versions before 23.2R1 or Junos OS Evolved versions before 23.2R1-EVO.
Impacto
Puntuación base 4.0
7.10
Gravedad 4.0
ALTA
Puntuación base 3.x
6.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:24.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:24.1:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



