Saturday, 21 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Security hole could let hackers take over Juniper Networks PTX core routers
Global Market

Security hole could let hackers take over Juniper Networks PTX core routers

Last updated: February 28, 2026 3:38 pm
Published February 28, 2026
Share
Juniper Networks
SHARE

“The On-Field Anomaly detection framework ought to solely be reachable by different inside processes over the interior routing occasion, however not over an externally uncovered port,” the alert provides. “With the flexibility to entry and manipulate the service to execute code as root, a distant attacker can take full management of the machine.”

To resolve the difficulty, admins ought to be certain that model 25.4R1-S1-EVO of Junos OS Advanced is put in. They need to additionally be aware that variations 25.4R2-EVO and 26.2R1-EVO are on the best way.

If the replace can’t be put in instantly, admins ought to use entry management lists or firewall filters to restrict entry to solely trusted networks and hosts, to cut back the danger of exploitation of this concern. Guarantee such filters solely allow explicitly required connections and block all others.

Another choice is to disable the service by coming into request pfe anomalies disable within the working system’s command line.

Sharma stated Juniper vulnerabilities have attracted plenty of consideration from hackers through the years due to the premium positioning the routers give if long-term footholds are established. “As a community working system, Junos sits on the crossroads of main management factors like id, coverage, and visitors, which implies a single exploit can scale shortly throughout precious networks,” he stated. “Moreover, these footholds present attackers an extended window to search out and exploit susceptible units, since core community gear is painful to use patching to as a consequence of lengthy downtimes.”

To forestall vulnerabilities resembling the present flaw from resulting in exploitation, organizations want a protection platform that may repeatedly monitor for anomalies throughout networks and alert safety groups when malicious conduct is detected, he added.

See also  Data Center Logical Security Market to See Incredible Growth 2024-2031 |Cisco, Mcafee, HP

Source link

TAGGED: Core, hackers, hole, Juniper, Networks, PTX, routers, security
Share This Article
Twitter Email Copy Link Print
Previous Article Latent AI, Sigma Defense and Abaco demonstrate hardware-agnostic edge AI for disconnected military operations Latent AI, Sigma Defense and Abaco demonstrate hardware-agnostic edge AI for disconnected military operations
Next Article H1 2026 - Data Centre Review H1 2026 – Data Centre Review
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

ClearBlade debuts edge-based forecasting AI for real-time industrial predictions

ClearBlade, an IoT platform and edge AI firm, launched the forecasting AI element inside its…

November 24, 2025

ReportAId Raises €2.2M in Pre-Seed Funding

ReportAId, a Milan, Italy-based firm utilizing AI to optimize healthcare processes, raised €2.2M in Pre-Seed…

May 6, 2025

JUUNOO Raises $6.6M in Internal Funding

JUUNO, a NYC-based design firm, raised $6.6M in Inner funding. Backers included current buyers The…

November 4, 2024

Will VMWare’s licensing changes push devirtualization of data centers?

The panorama of knowledge heart infrastructure is shifting dramatically, influenced by latest licensing adjustments from…

July 5, 2024

QuickStart Acquires Career Development Solutions

QuickStart, an Austin, TX-based firm which makes a speciality of on-line IT workforce improvement, acquired…

December 16, 2024

You Might Also Like

Achieving success with the cloud continuum
Global Market

Democratising cloud skills could be Europe’s next competitive edge

By saad
Nvidia GTC 2026 Vera Rubin
Global Market

Nvidia overhauls the data center for OpenClaw era

By saad
Antin Infrastructure Partners completes takeover of NorthC
Global Market

Antin Infrastructure Partners completes takeover of NorthC

By saad
Cloud Computing Disaster Recovery Solutions Concept - Cloud DR - Services Companies Use for the Purpose of Backing Up Resources into a Cloud Environment - 3D Illustration
Global Market

Nile adds microsegmentation and native NAC to its secure NaaS platform

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.