Latest
Vulnerabilities

Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers

Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers

Network administrators using Juniper PTX series routers are being urged to apply patches promptly due to a newly discovered critical vulnerability. This flaw could allow an unauthenticated attacker to execute code with root privileges.

The vulnerability is particularly concerning as these routers often operate at the core of networks rather than on the outskirts. Piyush Sharma, CEO of Tuskira, explained, "If an attacker gains control of a PTX, the impact is bigger than a single device compromise because it can become a traffic vantage point and a control point at the same time. This opens the door to the stealthy interception of data flows, controller redirected traffic, or easy pivots into adjacent networks."

This issue affects PTX routers running versions of the Junos OS Evolved operating system prior to 25.4R1-S1-EVO and 25.4R2-EVO, but does not impact the standard Junos OS.

Juniper's Response

In a recent announcement, Juniper stated that it is not aware of any active exploitation of this vulnerability. The flaw was identified during internal product security testing.

The PTX series consists of modular, high-performance core routers that are designed for 400G and 800G migrations. These routers are equipped with HPE Juniper Networks' latest custom Express family ASICs, offering features such as native 400G and 800G inline MACsec, deep buffering, and flexible filtering. Juniper claims that these devices are built for long-term use in demanding WAN and data center environments.

According to Juniper, the vulnerability arises from an Incorrect Permission Assignment for Critical Resource in the On-Box Anomaly detection framework, which is enabled by default. This allows an unauthenticated, network-based attacker to execute code as root.

Security Precautions

Juniper's alert emphasizes that the On-Box Anomaly detection framework should only be accessible by internal processes over the internal routing instance, and not through an externally exposed port. With access to manipulate the service, a remote attacker can gain complete control of the device.

To mitigate this risk, administrators are advised to ensure that version 25.4R1-S1-EVO of Junos OS Evolved is installed. They should also be aware that versions 25.4R2-EVO and 26.2R1-EVO are forthcoming.

In cases where immediate updates cannot be implemented, administrators should employ access control lists or firewall filters to restrict access to only trusted networks and hosts. These filters should allow only necessary connections while blocking all others.

Another protective measure includes disabling the service by executing the command request pfe anomalies disable in the operating system's command line.

Sharma noted that Juniper vulnerabilities have historically drawn significant attention from hackers, primarily due to the strategic importance of these routers. "As a network operating system, Junos sits at the crossroads of major control points like identity, policy, and traffic. This means a single exploit can quickly scale across valuable networks," he explained. Additionally, these vulnerabilities provide attackers with a longer timeframe to discover and exploit susceptible devices, as patching core network equipment often requires extensive downtime.

To avert similar vulnerabilities from being exploited, organizations need a robust defense platform capable of continuously monitoring for anomalies and alerting security teams when suspicious behavior is detected.

Upcoming Developments

This disclosure of the vulnerability coincides with HPE's plans to unveil new PTX12000 and PTX10002 router families at the upcoming Mobile World Congress. HPE recently acquired Juniper, signaling a strategic shift towards AI-centric networking solutions.

More in Vulnerabilities & Patches

30-Year-Old Vulnerability Discovered in libpng Library
Vulnerabilities

30-Year-Old Vulnerability Discovered in libpng Library

Apr 16, 2026 3 min read
Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws
Vulnerabilities

Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws

Apr 16, 2026 2 min read
10 Persistent Software Bugs That Took Ages to Fix
Vulnerabilities

10 Persistent Software Bugs That Took Ages to Fix

Apr 15, 2026 9 min read
Active Attacks Exploit Critical BeyondTrust RS Vulnerability
Vulnerabilities

Active Attacks Exploit Critical BeyondTrust RS Vulnerability

Apr 6, 2026 2 min read