Saturday, 28 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Security hole could let hackers take over Juniper Networks PTX core routers
Global Market

Security hole could let hackers take over Juniper Networks PTX core routers

Last updated: February 28, 2026 3:38 pm
Published February 28, 2026
Share
Juniper Networks
SHARE

“The On-Field Anomaly detection framework ought to solely be reachable by different inside processes over the interior routing occasion, however not over an externally uncovered port,” the alert provides. “With the flexibility to entry and manipulate the service to execute code as root, a distant attacker can take full management of the machine.”

To resolve the difficulty, admins ought to be certain that model 25.4R1-S1-EVO of Junos OS Advanced is put in. They need to additionally be aware that variations 25.4R2-EVO and 26.2R1-EVO are on the best way.

If the replace can’t be put in instantly, admins ought to use entry management lists or firewall filters to restrict entry to solely trusted networks and hosts, to cut back the danger of exploitation of this concern. Guarantee such filters solely allow explicitly required connections and block all others.

Another choice is to disable the service by coming into request pfe anomalies disable within the working system’s command line.

Sharma stated Juniper vulnerabilities have attracted plenty of consideration from hackers through the years due to the premium positioning the routers give if long-term footholds are established. “As a community working system, Junos sits on the crossroads of main management factors like id, coverage, and visitors, which implies a single exploit can scale shortly throughout precious networks,” he stated. “Moreover, these footholds present attackers an extended window to search out and exploit susceptible units, since core community gear is painful to use patching to as a consequence of lengthy downtimes.”

To forestall vulnerabilities resembling the present flaw from resulting in exploitation, organizations want a protection platform that may repeatedly monitor for anomalies throughout networks and alert safety groups when malicious conduct is detected, he added.

See also  Optimising cable sealing solutions to protect data centres

Source link

TAGGED: Core, hackers, hole, Juniper, Networks, PTX, routers, security
Share This Article
Twitter Email Copy Link Print
Previous Article Latent AI, Sigma Defense and Abaco demonstrate hardware-agnostic edge AI for disconnected military operations Latent AI, Sigma Defense and Abaco demonstrate hardware-agnostic edge AI for disconnected military operations
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

UK backs smaller AI projects while scrapping major investments

The UK authorities has introduced a £32 million funding in nearly 100 cutting-edge AI initiatives…

August 7, 2024

Corsha Receives Investment from Cybernetix Ventures

Corsha, a Vienna, VA-based supplier of a machine id supplier (mIDP) purpose-built to safe machine-to-machine…

August 2, 2025

Is API design a lost art?

It’s Friday morning, and you are excited. Today your new generative AI system running on…

January 31, 2024

10 cloud development gotchas to watch out for

The advantages of growing software program within the cloud embrace elevated flexibility and reliability, better effectivity,…

March 26, 2024

AI training costs are growing exponentially —  IBM says quantum computing could be a solution

Earlier this month, the Wall Road Journal reported {that a} third of nuclear energy vegetation…

July 26, 2024

You Might Also Like

CPP Investments and Equinix to buy atNorth in $4 billion deal
Global Market

CPP Investments and Equinix to buy atNorth in $4 billion deal

By saad
AI
Global Market

OpenAI launches stateful AI on AWS, signaling a control plane power shift

By saad
AI is rewriting the rules of data centre power – who wins?
Global Market

AI is rewriting the rules of data centre power – who wins?

By saad
Genetec unveils UK data centre for Security Center SaaS
Colocation

Genetec unveils UK data centre for Security Center SaaS

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.