CVE-2026-21906 (CNNVD-202601-2558)
中文标题:
Juniper Networks Junos OS 安全漏洞
英文标题:
Junos OS: SRX Series: With GRE performance acceleration enabled, receipt of a specific ICMP packet causes the PFE to crash
漏洞描述
中文描述:
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS 21.4R3-S12之前版本、22.4R3-S8之前版本、23.2R2-S5之前版本、23.4R2-S5之前版本、24.2R2-S3之前版本、24.4R2-S1之前版本、25.2R1-S1和25.2R2之前版本存在安全漏洞,该漏洞源于数据包转发引擎异常条件处理不当,可能导致拒绝服务。
英文描述:
An Improper Handling of Exceptional Conditions vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated network-based attacker sending a specific ICMP packet through a GRE tunnel to cause the PFE to crash and restart. When PowerMode IPsec (PMI) and GRE performance acceleration are enabled and the device receives a specific ICMP packet, a crash occurs in the SRX PFE, resulting in traffic loss. PMI is enabled by default, and GRE performance acceleration can be enabled by running the configuration command shown below. PMI is a mode of operation that provides IPsec performance improvements using Vector Packet Processing. Note that PMI with GRE performance acceleration is only supported on specific SRX platforms. This issue affects Junos OS on the SRX Series: * all versions before 21.4R3-S12, * from 22.4 before 22.4R3-S8, * from 23.2 before 23.2R2-S5, * from 23.4 before 23.4R2-S5, * from 24.2 before 24.2R2-S3, * from 24.4 before 24.4R2-S1, * from 25.2 before 25.2R1-S1, 25.2R2.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Juniper Networks | Junos OS | - | < 21.4R3-S12 | - |
cpe:2.3:a:juniper_networks:junos_os:*:*:*:*:*:*:*:*
|
| juniper | junos | * | - | - |
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
|
| juniper | junos | 21.4 | - | - |
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
|
| juniper | junos | 22.4 | - | - |
cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*
|
| juniper | junos | 23.2 | - | - |
cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*
|
| juniper | junos | 23.4 | - | - |
cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*
|
| juniper | junos | 24.2 | - | - |
cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*
|
| juniper | junos | 24.4 | - | - |
cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:*
|
| juniper | junos | 25.2 | - | - |
cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.0 (cna)
HIGHCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/V:C/RE:M/U:Red
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-21906 |
2026-01-16 02:21:11 | 2026-01-16 02:44:25 |
| NVD | nvd_CVE-2026-21906 |
2026-01-16 02:47:34 | 2026-01-16 02:48:09 |
| CNNVD | cnnvd_CNNVD-202601-2558 |
2026-01-19 09:28:44 | 2026-01-19 09:29:39 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 9
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202601-2558
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 7 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']