🔐 CVE Alert

CVE-2026-0203

MEDIUM 6.5

Junos OS: Receipt of a specifically malformed ICMP packet causes an FPC restart

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS allows an unauthenticated, network-adjacent attacker sending a specifically malformed ICMP packet to cause an FPC to crash and restart, resulting in a Denial of Service (DoS). When an ICMP packet is received with a specifically malformed IP header value, the FPC receiving the packet crashes and restarts. Due to the specific type of malformed packet, adjacent upstream routers would not forward the packet, limiting the attack surface to adjacent networks. This issue only affects ICMPv4. ICMPv6 is not vulnerable to this issue. This issue does not affect AFT-based line cards such as the MPC10, MPC11, LC4800, LC9600, and MX304. This issue affects Junos OS:  * all versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S10,  * from 22.2 before 22.2R3-S7,  * from 22.3 before 22.3R3-S4,  * from 22.4 before 22.4R3-S5,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S3,  * from 24.2 before 24.2R1-S2, 24.2R2.

CWE CWE-755
Vendor juniper networks
Product junos os
Published Jan 15, 2026
Last Updated Mar 10, 2026
Stay Ahead of the Next One

Get instant alerts for juniper networks junos os

Be the first to know when new medium vulnerabilities affecting juniper networks junos os are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Juniper Networks / Junos OS
0 < 21.2R3-S9 21.4 < 21.4R3-S10 22.2 < 22.2R3-S7 22.3 < 22.3R3-S4 22.4 < 22.4R3-S5 23.2 < 23.2R2-S3 23.4 < 23.4R2-S3 24.2 < 24.2R1-S2, 24.2R2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
supportportal.juniper.net: https://supportportal.juniper.net/JSA104294 kb.juniper.net: https://kb.juniper.net/JSA104294