{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/junos/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["junos","rce","vulnerability"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA critical vulnerability, CVE-2026-21902, has been identified in Juniper Networks Junos OS Evolved PTX Series versions before 25.4R1-S1-EVO and 25.4R2-EVO. This vulnerability resides in the on-box anomaly detection framework and allows an unauthenticated, network-based attacker to execute arbitrary code as the root user. Given the pivotal role of PTX series routers in data centers and internet service provider networks, a successful exploit can lead to significant disruption, enabling attackers…\u003c/p\u003e\n","date_modified":"2026-02-27T15:13:48Z","date_published":"2026-02-27T15:13:48Z","id":"/briefs/2026-02-junos-rce/","summary":"A critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.","title":"Critical Unauthenticated RCE Vulnerability in Junos OS Evolved","url":"https://feed.craftedsignal.io/briefs/2026-02-junos-rce/"}],"language":"en","title":"CraftedSignal Threat Feed — Junos","version":"https://jsonfeed.org/version/1.1"}