Wednesday, 15 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Security hole could let hackers take over Juniper Networks PTX core routers
Global Market

Security hole could let hackers take over Juniper Networks PTX core routers

Last updated: February 28, 2026 3:38 pm
Published February 28, 2026
Share
Juniper Networks
SHARE

“The On-Field Anomaly detection framework ought to solely be reachable by different inside processes over the interior routing occasion, however not over an externally uncovered port,” the alert provides. “With the flexibility to entry and manipulate the service to execute code as root, a distant attacker can take full management of the machine.”

To resolve the difficulty, admins ought to be certain that model 25.4R1-S1-EVO of Junos OS Advanced is put in. They need to additionally be aware that variations 25.4R2-EVO and 26.2R1-EVO are on the best way.

If the replace can’t be put in instantly, admins ought to use entry management lists or firewall filters to restrict entry to solely trusted networks and hosts, to cut back the danger of exploitation of this concern. Guarantee such filters solely allow explicitly required connections and block all others.

Another choice is to disable the service by coming into request pfe anomalies disable within the working system’s command line.

Sharma stated Juniper vulnerabilities have attracted plenty of consideration from hackers through the years due to the premium positioning the routers give if long-term footholds are established. “As a community working system, Junos sits on the crossroads of main management factors like id, coverage, and visitors, which implies a single exploit can scale shortly throughout precious networks,” he stated. “Moreover, these footholds present attackers an extended window to search out and exploit susceptible units, since core community gear is painful to use patching to as a consequence of lengthy downtimes.”

To forestall vulnerabilities resembling the present flaw from resulting in exploitation, organizations want a protection platform that may repeatedly monitor for anomalies throughout networks and alert safety groups when malicious conduct is detected, he added.

See also  Zayo introduces new wavelength route between London & Paris

Source link

TAGGED: Core, hackers, hole, Juniper, Networks, PTX, routers, security
Share This Article
Twitter Email Copy Link Print
Previous Article Latent AI, Sigma Defense and Abaco demonstrate hardware-agnostic edge AI for disconnected military operations Latent AI, Sigma Defense and Abaco demonstrate hardware-agnostic edge AI for disconnected military operations
Next Article H1 2026 - Data Centre Review H1 2026 – Data Centre Review
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

nLighten strengthens its French presence with acquisition

nLighten has introduced the acquisition of an information centre in Émerainville, Paris. This addition comes…

February 10, 2026

Why an ‘All-of-the-Above’ Energy Strategy Is Essential for Data Center Growth

Quickly creating applied sciences will not be merely driving innovation. They're additionally driving an unprecedented…

March 19, 2025

Investments, advances bring quantum computing closer :: WRAL.com

Final week I summarized takeaways from my go to to SXSW earlier this month. As…

March 25, 2025

1 Top Data Center Power-Chip Stock You Need to Know About Right Now

Monolithic Energy has been on one more epic run. Share costs of energy chip designer…

July 4, 2024

What it means to ‘fight AI with AI’

I just lately learn an article reporting a brand new, generative AI worm dubbed “Morris…

June 16, 2024

You Might Also Like

AI ambition means little without the people to run it
Global Market

AI ambition means little without the people to run it

By saad
A human hand against a midnight-black background holds a tablet like a platter with the word
Global Market

Cisco just made two moves to own the AI infrastructure stack

By saad
As cyber-attacks become more and more sophisticated, cybersecurity must adopt a zero trust policy- verify, validify and authenticate at every step. Biometrics can help reduce friction in this process.
Innovations

Biometrics in zero trust architecture: Rebuilding security around identity

By saad
Sateliot estrecha lazos con Leaf Space.
Global Market

Satellite backhaul service Globalstar has a new, rich owner amid challenging market conditions

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.