CVE-2026-21914

CWE-6674 documents4 sources
Severity
8.7HIGH
EPSS
0.0%
top 97.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15

Description

An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos). If an SRX Series device receives a specifically malformed GPRS Tunnelling Protocol (GTP) Modify Bearer Request message, a lock is acquired and never released. This results in other threads not being able to acquire a lock themselves, causing a watchdog timeout leading to FPC crash and restart. This issue leads to a c

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os23.223.2R2-S5+5
NVDjuniper/junos< 22.4+6

🔴Vulnerability Details

2
CVEList
Junos OS: SRX Series: A specifically malformed GTP message will cause an FPC crash2026-01-15
GHSA
GHSA-w5fv-m4rq-pgg2: An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to ca2026-01-15

📋Vendor Advisories

1
Juniper
CVE-2026-21914: An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to ca2026-01-15
CVE-2026-21914 (HIGH CVSS 8.7) | An Improper Locking vulnerability i | cvebase.io