{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T12:54:07.889","vulnerabilities":[{"cve":{"id":"CVE-2026-21913","sourceIdentifier":"sirt@juniper.net","published":"2026-01-15T21:16:07.537","lastModified":"2026-01-23T19:40:56.563","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An Incorrect Initialization of Resource vulnerability in the Internal Device Manager (IDM) of Juniper Networks Junos OS on EX4000 models allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nOn EX4000 models with 48 ports (EX4000-48T, EX4000-48P, EX4000-48MP) a high volume of traffic destined to the device will cause an FXPC crash and restart, which leads to a complete service outage until the device has automatically restarted.\n\n\n\n\nThe following reboot reason can be seen in the output of 'show chassis routing-engine' and as a log message:\n\n  reason=0x4000002 reason_string=0x4000002:watchdog + panic with core dump \n\n\n\n\nThis issue affects Junos OS on EX4000-48T, EX4000-48P and EX4000-48MP:\n\n\n\n  *  24.4 versions before 24.4R2,\n  *  25.2 versions before 25.2R1-S2, 25.2R2.\n\n\n\n\nThis issue does not affect versions before 24.4R1 as the first Junos OS version for the EX4000 models was 24.4R1."},{"lang":"es","value":"Una vulnerabilidad de inicialización incorrecta de recursos en el Administrador de Dispositivos Internos (IDM) de Juniper Networks Junos OS en modelos EX4000 permite a un atacante no autenticado, basado en red, causar una Denegación de Servicio (DoS).\n\nEn los modelos EX4000 con 48 puertos (EX4000-48T, EX4000-48P, EX4000-48MP), un alto volumen de tráfico destinado al dispositivo causará un fallo y reinicio de FXPC, lo que lleva a una interrupción completa del servicio hasta que el dispositivo se haya reiniciado automáticamente.\n\nLa siguiente razón de reinicio se puede ver en la salida de 'show chassis routing-engine' y como un mensaje de registro:\n\nreason=0x4000002 reason_string=0x4000002:watchdog + panic with core dump\n\nEste problema afecta a Junos OS en EX4000-48T, EX4000-48P y EX4000-48MP:\n\n  *  versiones 24.4 anteriores a 24.4R2,\n  *  versiones 25.2 anteriores a 25.2R1-S2, 25.2R2.\n\nEste problema no afecta a las versiones anteriores a 24.4R1, ya que la primera versión de Junos OS para los modelos EX4000 fue 24.4R1."}],"metrics":{"cvssMetricV40":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:X","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"LOW","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"AUTOMATIC","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"sirt@juniper.net","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-665"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:*","matchCriteriaId":"C452BDCB-34E3-42D3-8909-2312356EB70A"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:*","matchCriteriaId":"2B8158F2-2028-40E9-955F-CFD581A32F60"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:*","matchCriteriaId":"1A7233A1-EC7A-4458-9AE1-835480A03A21"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:24.4:r1-s3:*:*:*:*:*:*","matchCriteriaId":"D74087E2-5CAA-4085-8408-EB70EC1D5D91"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*","matchCriteriaId":"1B7572BB-9C77-4214-9C5F-CC83C7B93E37"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*","matchCriteriaId":"CAADBF98-38BE-40E2-AF1B-9077DCED0809"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*","matchCriteriaId":"558F0A4C-0C72-4BF1-B2DE-C0D3BFD54BCD"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:25.2:r2:*:*:*:*:*:*","matchCriteriaId":"6C7B9DEB-7472-4010-8717-8050555C2FAD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4000-48mp:-:*:*:*:*:*:*:*","matchCriteriaId":"62095696-9ECD-4348-9CEF-B2964ADECDC0"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4000-48p:-:*:*:*:*:*:*:*","matchCriteriaId":"5D907C1B-4C3D-4280-B5D9-FA0557B5A72F"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4000-48t:-:*:*:*:*:*:*:*","matchCriteriaId":"4009C8F8-19AE-4DAF-8CF7-0DC5EA76A852"}]}]}],"references":[{"url":"https://kb.juniper.net/JSA106014","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"https://supportportal.juniper.net/JSA106014","source":"sirt@juniper.net","tags":["Vendor Advisory"]}]}}]}