VYPR
Medium severity6.5NVD Advisory· Published Apr 9, 2026· Updated Apr 17, 2026

CVE-2026-33775

CVE-2026-33775

Description

A Missing Release of Memory after Effective Lifetime vulnerability in the BroadBand Edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).

If the authentication packet-type option is configured and a received packet does not match that packet type, the memory leak occurs. When all memory

available to bbe-smgd has been consumed, no new subscribers will be able to login.

The memory utilization of bbe-smgd can be monitored with the following show command:

user@host> show system processes extensive | match bbe-smgd

The below log message can be observed when this limit has been reached:

bbesmgd[<PID>]: %DAEMON-3-SMD_DPROF_RSMON_ERROR: Resource unavailability, Reason: Daemon Heap Memory exhaustion

This issue affects Junos OS on MX Series: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2, * 25.2 versions before 25.2R2.

Affected products

49
  • cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*+ 48 more
    • cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*range: <22.4
    • cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s6:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:22.4:r3-s7:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r2-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.2:r2-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r2-s4:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:23.4:r2-s5:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.2:r2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.2:r2-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:24.4:r1-s3:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.