CVE-2026-21911

6.5 MEDIUM

📋 TL;DR

An incorrect calculation vulnerability in Juniper's Layer 2 Control Protocol Daemon (l2cpd) allows unauthenticated network-adjacent attackers to cause denial of service by flapping the management interface. This stops MAC address learning over label-switched interfaces while generating excessive logs and high CPU usage. Affects Junos OS Evolved across multiple version branches.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions before 21.4R3-S7-EVO, 22.2 before 22.2R3-S4-EVO, 22.3 before 22.3R3-S3-EVO, 22.4 before 22.4R3-S2-EVO, 23.2 before 23.2R2-S1-EVO, 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network adjacency to management interface and label-switched interfaces in use.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service on affected devices, disrupting network connectivity and potentially causing cascading failures in dependent systems.

🟠

Likely Case

Degraded network performance due to stopped MAC learning and high CPU consumption, requiring device restart to recover.

🟢

If Mitigated

Limited impact if network segmentation prevents adjacent attackers from reaching management interfaces.

🌐 Internet-Facing: LOW - Requires network adjacency to management interface, not typically internet-facing.
🏢 Internal Only: MEDIUM - Internal attackers with network adjacency to management interfaces can trigger the DoS condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network adjacency and ability to flap management interface, but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO, 22.4R3-S2-EVO, 23.2R2-S1-EVO, 23.4R1-S2-EVO, or later versions

Vendor Advisory: https://kb.juniper.net/JSA106010

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Juniper support portal. 2. Backup current configuration. 3. Install patch using Junos upgrade procedures. 4. Reboot device to activate patched version.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit network access to management interfaces using ACLs or firewall rules to prevent adjacent attackers from reaching them.

set firewall family inet filter mgmt-filter term block-unauthorized from source-address 0.0.0.0/0
set firewall family inet filter mgmt-filter term block-unauthorized then discard
set interfaces em0 unit 0 family inet filter input mgmt-filter

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces from untrusted networks
  • Monitor for the specific log pattern and implement automated alerting for detection

🔍 How to Verify

Check if Vulnerable:

Check current Junos OS Evolved version against affected version ranges listed in advisory

Check Version:

show version | match Junos

Verify Fix Applied:

Verify installed version is patched version or later, and monitor for absence of the specific log message

📡 Detection & Monitoring

Log Indicators:

  • Log message containing: 'GETIFBD_VALIDATE_FAILED' and 'IFBD_VALIDATE_FAIL_EPOCH_MISMATCH'
  • High volume of l2cpd logs
  • Unexplained high CPU usage on affected devices

Network Indicators:

  • Unusual management interface flapping activity
  • Stopped MAC address learning on label-switched interfaces

SIEM Query:

source="junos" AND ("GETIFBD_VALIDATE_FAILED" OR "IFBD_VALIDATE_FAIL_EPOCH_MISMATCH")

🔗 References

📤 Share & Export