Metrics
Affected Vendors & Products
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Junos Space 24.1R5 and all subsequent releases.
Workaround
There are no direct workarounds for this issue. Ensure any clients connecting to the device do not allow negotiation of static RSA key exchange.
Thu, 15 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Use of a Broken or Risky Cryptographic Algorithm vulnerability in the TLS/SSL server of Juniper Networks Junos Space allows the use of static key ciphers (ssl-static-key-ciphers), reducing the confidentiality of on-path traffic communicated across the connection. These ciphers also do not support Perfect Forward Secrecy (PFS), affecting the long-term confidentiality of encrypted communications.This issue affects all versions of Junos Space before 24.1R5. | |
| Title | Junos Space: TLS/SSL server supports use of static key ciphers (ssl-static-key-ciphers) | |
| Weaknesses | CWE-327 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2026-01-15T21:12:31.198Z
Reserved: 2026-01-05T17:32:48.710Z
Link: CVE-2026-21907
No data.
Status : Received
Published: 2026-01-15T21:16:06.357
Modified: 2026-01-15T21:16:06.357
Link: CVE-2026-21907
No data.
OpenCVE Enrichment
No data.