CVE-2026-33778
Description
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of-Service (DoS).
If an affected device receives a specifically malformed first ISAKMP packet from the initiator, the kmd/iked process will crash and restart, which momentarily prevents new security associations (SAs) for from being established. Repeated exploitation of this vulnerability causes a complete inability to establish new VPN connections.
This issue affects Junos OS on
SRX Series and MX Series:
- all versions before 22.4R3-S9,
- 23.2 version before 23.2R2-S6,
- 23.4 version before 23.4R2-S7,
- 24.2 versions before 24.2R2-S4,
- 24.4 versions before 24.4R2-S3,
- 25.2 versions before 25.2R1-S2, 25.2R2.
Affected products
57cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*+ 56 more
- cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*range: <22.4
- cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r3-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- kb.juniper.net/JSA107868nvdVendor Advisory
News mentions
0No linked articles in our index yet.