An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root.

The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device.
Please note that this service is enabled by default as no specific configuration is required.

This issue affects Junos OS Evolved on PTX Series:



* 25.4 versions before 25.4R1-S1-EVO, 25.4R2-EVO.




This issue does not affect Junos OS Evolved versions before 25.4R1-EVO.

This issue does not affect Junos OS.

Project Subscriptions

Vendors Products
Juniper Subscribe
Junos Os Evolved Subscribe
Ptx10001-36mr Subscribe
Ptx10002-36qdd Subscribe
Ptx10003 Subscribe
Ptx10004 Subscribe
Ptx10008 Subscribe
Ptx10016 Subscribe
Juniper Networks Subscribe
Junos Os Evolved Subscribe
Advisories

No advisories yet.

Fixes

Solution

The following software releases have been updated to resolve this specific issue: 25.4R1-S1-EVO, 25.4R2-EVO*, 26.2R1-EVO*, and all subsequent releases. * Future Release


Workaround

To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted networks and hosts. Please ensure such filters only permit explicitly required connections and block all others. Also this service can be disabled by 'request pfe anomalies disable'.

History

Mon, 30 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Juniper
Juniper junos Os Evolved
Juniper ptx10001-36mr
Juniper ptx10002-36qdd
Juniper ptx10003
Juniper ptx10004
Juniper ptx10008
Juniper ptx10016
CPEs cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10002-36qdd:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.4:r1:*:*:*:*:*:*
Vendors & Products Juniper
Juniper junos Os Evolved
Juniper ptx10001-36mr
Juniper ptx10002-36qdd
Juniper ptx10003
Juniper ptx10004
Juniper ptx10008
Juniper ptx10016

Tue, 03 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Juniper Networks
Juniper Networks junos Os Evolved
Vendors & Products Juniper Networks
Juniper Networks junos Os Evolved

Thu, 26 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root. The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device. Please note that this service is enabled by default as no specific configuration is required. This issue affects Junos OS Evolved on PTX Series: * 25.4 versions before 25.4R1-S1-EVO, 25.4R2-EVO. This issue does not affect Junos OS Evolved versions before 25.4R1-EVO. This issue does not affect Junos OS.
Title Junos OS Evolved: PTX Series: A vulnerability allows a unauthenticated, network-based attacker to execute code as root
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/AU:Y/R:U/RE:M/U:Red'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2026-03-04T04:55:12.668Z

Reserved: 2026-01-05T17:32:48.709Z

Link: CVE-2026-21902

cve-icon Vulnrichment

Updated: 2026-02-25T19:14:22.032Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T18:23:40.360

Modified: 2026-03-30T15:16:05.537

Link: CVE-2026-21902

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-26T13:15:15Z

Weaknesses