The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-21902

CVE-2026-21902: Junos OS Evolved Privilege Escalation Flaw

CVE-2026-21902 is a privilege escalation vulnerability in Juniper Networks Junos OS Evolved on PTX Series that allows remote attackers to execute code as root and gain full device control. This article covers technical details, affected versions, impact assessment, and mitigation strategies.

Published: February 27, 2026

CVE-2026-21902 Overview

CVE-2026-21902 is a critical Incorrect Permission Assignment for Critical Resource vulnerability (CWE-732) affecting the On-Box Anomaly detection framework in Juniper Networks Junos OS Evolved on PTX Series devices. This vulnerability enables an unauthenticated, network-based attacker to execute arbitrary code with root privileges, leading to complete device compromise.

The On-Box Anomaly detection framework is designed to be accessible only by internal processes over the internal routing instance. However, due to improper permission assignment, the service is exposed over an externally accessible port. This misconfiguration allows remote attackers to access and manipulate the service, executing code as root and gaining complete control over vulnerable devices. Critically, this service is enabled by default with no specific configuration required, meaning all affected devices are vulnerable out of the box.

Critical Impact

Unauthenticated remote attackers can execute code as root, resulting in complete device takeover. The vulnerability is enabled by default and requires no user interaction to exploit.

Affected Products

  • Juniper Networks Junos OS Evolved on PTX Series version 25.4 (before 25.4R1-S1-EVO, 25.4R2-EVO)
  • Junos OS Evolved versions 25.4R1-EVO and later (until patched versions)
  • Note: Junos OS (non-Evolved) and versions before 25.4R1-EVO are NOT affected

Discovery Timeline

  • 2026-02-25 - CVE-2026-21902 published to NVD
  • 2026-02-25 - Last updated in NVD database

Technical Details for CVE-2026-21902

Vulnerability Analysis

This vulnerability stems from improper permission assignment on a critical network service within the Junos OS Evolved operating system. The On-Box Anomaly detection framework, which is intended to provide internal anomaly detection capabilities, fails to properly restrict network access to its service endpoints.

Under normal operation, this framework should only accept connections from other internal processes communicating over the internal routing instance. However, the vulnerable implementation exposes the service on an external port that can be reached by any network-based attacker. This exposure is compounded by the fact that the service runs with root privileges, meaning any successful exploitation grants the attacker the highest level of system access.

The attack surface is particularly concerning because PTX Series routers are typically deployed in core network infrastructure positions, making them high-value targets for attackers seeking to establish persistence or pivot within enterprise and service provider networks.

Root Cause

The root cause is classified as CWE-732 (Incorrect Permission Assignment for Critical Resource). The On-Box Anomaly detection framework service was deployed with overly permissive network access controls, binding to externally accessible network interfaces rather than being restricted to internal-only routing instances. This architectural oversight exposes a privileged service to untrusted network traffic without proper authentication or access controls.

Attack Vector

The attack vector is network-based, requiring no authentication or user interaction. An attacker with network connectivity to a vulnerable PTX Series device running Junos OS Evolved 25.4R1-EVO can remotely access the exposed Anomaly detection framework service. By exploiting this service, the attacker can execute arbitrary commands with root privileges, enabling complete device compromise.

The attack scenario involves:

  1. Network reconnaissance to identify PTX Series devices running vulnerable Junos OS Evolved versions
  2. Direct connection to the exposed Anomaly detection framework service port
  3. Exploitation of the service to execute arbitrary code as root
  4. Full device takeover with persistence capabilities

Since this service is enabled by default, all PTX Series devices running the affected Junos OS Evolved versions are immediately vulnerable upon deployment without any additional configuration.

Detection Methods for CVE-2026-21902

Indicators of Compromise

  • Unexpected network connections to the On-Box Anomaly detection framework service ports from external sources
  • Unusual process execution or system calls initiated by the Anomaly detection framework
  • Unauthorized modifications to system configuration files or firmware
  • Presence of unrecognized user accounts or SSH keys on the device
  • Anomalous outbound network traffic from PTX Series devices indicating potential command-and-control communication

Detection Strategies

  • Monitor network traffic for external connections to internal-only services on PTX Series devices
  • Implement network segmentation and firewall rules to detect unauthorized access attempts to management interfaces
  • Deploy intrusion detection systems (IDS) with signatures for Junos OS Evolved exploitation attempts
  • Review device logs for authentication failures or unusual service access patterns
  • Utilize SentinelOne Singularity for network visibility and anomaly detection across infrastructure devices

Monitoring Recommendations

  • Establish baseline network behavior for PTX Series devices and alert on deviations
  • Enable comprehensive logging on Junos OS Evolved devices and forward logs to a centralized SIEM
  • Monitor for process execution anomalies or privilege escalation events on network infrastructure
  • Implement continuous vulnerability scanning to identify unpatched devices in the environment

How to Mitigate CVE-2026-21902

Immediate Actions Required

  • Upgrade affected Juniper PTX Series devices to Junos OS Evolved versions 25.4R1-S1-EVO or 25.4R2-EVO or later
  • Implement network access controls to restrict access to device management interfaces from trusted sources only
  • Audit existing PTX Series deployments to identify devices running vulnerable Junos OS Evolved versions
  • Review device configurations and logs for signs of prior exploitation
  • Engage Juniper TAC for guidance on urgent mitigation if immediate patching is not possible

Patch Information

Juniper Networks has released patched versions of Junos OS Evolved to address this vulnerability. Affected organizations should upgrade to 25.4R1-S1-EVO, 25.4R2-EVO, or any subsequent release. The official security advisory is available at the Juniper Knowledge Base Advisory and Juniper Support Portal Advisory.

Workarounds

  • Implement strict network access control lists (ACLs) to limit external access to PTX Series management interfaces
  • Deploy the device behind a firewall that blocks unauthorized access to the Anomaly detection framework service ports
  • Use out-of-band management networks to isolate device management traffic from production networks
  • Consider disabling the On-Box Anomaly detection framework if not required (consult Juniper documentation for impact assessment)
bash
# Example: Restrict management access using firewall filter (consult Juniper documentation for your specific configuration)
set firewall family inet filter PROTECT-RE term ALLOW-MGMT from source-prefix-list TRUSTED-MGMT-HOSTS
set firewall family inet filter PROTECT-RE term ALLOW-MGMT then accept
set firewall family inet filter PROTECT-RE term DENY-ALL then discard

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechJunos

  • SeverityCRITICAL

  • CVSS Score9.3

  • EPSS Probability0.25%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Red
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-732
  • Technical References
  • Juniper Knowledge Base Advisory

  • Juniper Support Portal Advisory
  • Related CVEs
  • CVE-2025-59961: Junos OS jdhcpd Privilege Escalation Flaw

  • CVE-2026-21921: Juniper Networks Junos OS DoS Vulnerability

  • CVE-2025-59960: Junos OS DHCP Service DoS Vulnerability

  • CVE-2025-59959: Juniper Junos OS rpd DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English