CVE-2026-21908
Severity
7.5HIGH
EPSS
0.0%
top 98.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Description
A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated, network-adjacent attacker flapping a port to crash the dot1xd process, leading to a Denial of Service (DoS), or potentially execute arbitrary code within the context of the process running as root.
The issue is specific to the processing of a change in authorization (CoA) when a port bounce occurs. A pointer is freed but …
CVSS vector
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L
Affected Packages4 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Juniper▶
CVE-2026-21908: A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Juniper Networks Junos OS and Junos OS Evolved that coul↗2026-01-15