Exclusive Webinar: Beyond the Perimeter – How to See Every Threat in Hybrid Networks

CVE-2026-21902

CVE-2026-21902 Explained: Unauthenticated Root RCE in Juniper PTX Routers

CVSS Gauge
CVSS Needle

Summary

CVE-2026-21902 is a critical flaw in Junos OS Evolved on Juniper PTX routers. The On-Box Anomaly Detection service, meant for internal use, can be accessed externally, letting unauthenticated attackers run code as root. Enabled by default, it allows full device control. Affected versions are 25.4 before 25.4R1-S1-EVO and 25.4R2-EVO; patches are available.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-21902?

Technical Overview

How Does the CVE-2026-21902 Exploit Work?

The attack typically follows these steps:

CVE-2026-21902

What Causes CVE-2026-21902?

Vulnerability Root Cause:

CVE-2026-21902 arises from incorrect permission assignments in the On-Box Anomaly Detection Framework of Junos OS Evolved on PTX Series. The service, running as root and enabled by default, is intended for internal processes only but can be accessed externally. This misconfiguration allows unauthenticated network attackers to execute arbitrary code with root privileges, giving full control over the device without authentication or user interaction.

How Can You Mitigate CVE-2026-21902?

If immediate patching is delayed or not possible:

  • Restrict service access with firewalls or ACLs to trusted networks.
  • Block traffic to the Anomaly Detection service from untrusted sources.
  • Temporarily disable the service using request pfe anomalies disable.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-21902 Cause Downtime?

Patch application impact: Minimal downtime; update Junos OS Evolved on PTX Series to 25.4R1-S1-EVO or 25.4R2-EVO.

Mitigation (if immediate patching is not possible): Restrict port 8160/TCP via ACLs or disable the service (request pfe anomalies disable) until patched.

How Can You Detect CVE-2026-21902 Exploitation?

Exploitation Signatures:

Look for traffic targeting port 8160/TCP on Juniper PTX devices, especially requests creating or modifying DAGs, commands, or DAG instances via the On-Box Anomaly Detection Framework API.

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.