{"id":43991,"date":"2026-02-26T23:37:40","date_gmt":"2026-02-26T15:37:40","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/critical-juniper-networks-ptx-flaw-allows-full-router-takeover\/"},"modified":"2026-02-26T23:37:40","modified_gmt":"2026-02-26T15:37:40","slug":"critical-juniper-networks-ptx-flaw-allows-full-router-takeover","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/critical-juniper-networks-ptx-flaw-allows-full-router-takeover\/","title":{"rendered":"Critical Juniper Networks PTX flaw allows full router takeover"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/12\/19\/Juniper.jpg\" width=\"1600\" alt=\"Critical Juniper Networks PTX flaw allows full router takeover\"><\/p>\n<p>A critical vulnerability in the Junos OS Evolved network operating system running on PTX&nbsp;Series routers from Juniper Networks could allow an unauthenticated attacker to execute code remotely with root privileges.<\/p>\n<p><a href=\"https:\/\/www.juniper.net\/us\/en\/products\/routers\/ptx-series.html\/\" rel=\"nofollow noopener\">PTX Series routers<\/a> are high-performance core and peering routers built for high throughput, low latency, and scale. They are commonly used by internet service providers, telecommunication services, and cloud network applications.<\/p>\n<p>The security issue is identified as&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21902\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-21902<\/a>&nbsp;and is caused by&nbsp;incorrect permission assignment in the &lsquo;On-Box Anomaly Detection&rsquo; framework, which should be exposed to internal processes only over the internal routing interface.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Critical Juniper Networks PTX flaw allows full router takeover\"><\/a> <\/div>\n<p>However, the glitch allows accessing the framework over an externally exposed port, Juniper Networks explains in a <a href=\"https:\/\/supportportal.juniper.net\/s\/article\/2026-02-Out-of-Cycle-Security-Bulletin-Junos-OS-Evolved-PTX-Series-A-vulnerability-allows-a-unauthenticated-network-based-attacker-to-execute-code-as-root-CVE-2026-21902\" target=\"_blank\" rel=\"nofollow noopener\">security advisory<\/a>.<\/p>\n<p>Because the service runs as root and is enabled by default, successful exploitation would allow an attacker who is already on the network&nbsp;to take full control of the device without authentication.<\/p>\n<p>The issue affects Junos OS Evolved versions before 25.4R1-S1-EVO and 25.4R2-EVO, on PTX Series routers. Older versions may also be impacted, but the vendor does not assess releases that have reached the end-of-engineering or&nbsp;end-of-life (EoL) phase.<\/p>\n<p>Versions before 25.4R1-EVO, and standard (non-Evolved) Junos OS versions are not impacted by CVE-2026-21902.&nbsp;Juniper Networks has delivered fixes in versions 25.4R1-S1-EVO, 25.4R2-EVO, and 26.2R1-EVO of the product.<\/p>\n<p>Juniper&#8217;s&nbsp;Security Incident Response Team (SIRT) states that it was not aware of malicious exploitation of the vulnerability at the time of publishing the security bulletin.<\/p>\n<p>If immediate patching is not possible, the vendor&#8217;s recommendation is to restrict access to the vulnerable endpoints to trusted networks only using firewall filters or Access Control Lists (ACLs).&nbsp;Alternatively, administrators may disable the vulnerable service entirely using:<\/p>\n<p><code>'request pfe anomalies disable'<\/code><\/p>\n<p>Juniper Networks products are typically an attractive target for advanced hackers as the network equipment is used by service providers requiring high bandwidth, such as cloud data centers and large enterprises.<\/p>\n<p>In March 2025, it was revealed that Chinese cyber-espionage actors were <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-cyberspies-backdoor-juniper-routers-for-stealthy-access\/\" target=\"_blank\" rel=\"nofollow noopener\">deploying custom backdoors<\/a> on EoL Junos OS MX routers to drop a set of &lsquo;TinyShell&rsquo; backdoor variants.<\/p>\n<p>In January 2025, a malware campaign <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stealthy-magic-packet-malware-targets-juniper-vpn-gateways\/\" target=\"_blank\" rel=\"nofollow noopener\">dubbed &lsquo;J-magic&rsquo;<\/a> targeted Juniper VPN gateways used in the semiconductor, energy, manufacturing, and IT sectors, deploying network-sniffing malware that activated upon receiving a &ldquo;magic packet.&rdquo;<\/p>\n<p>In December 2024, Juniper Networks Smart routers became <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/juniper-warns-of-mirai-botnet-scanning-for-session-smart-routers\/\" target=\"_blank\" rel=\"nofollow noopener\">targets of Mirai botnet<\/a> campaigns, getting enlisted in distributed denial of service (DDoS) swarms.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Critical Juniper Networks PTX flaw allows full router takeover\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers\/\">Zyxel warns of critical RCE flaw affecting over a dozen routers<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks\/\">CISA: BeyondTrust RCE flaw now exploited in ransomware attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\">CISA gives feds 3 days to patch actively exploited BeyondTrust flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now\/\">Critical BeyondTrust RCE flaw now exploited in attacks, patch now<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in the Junos OS Evolved networ [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43991","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43991"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43991\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}