VYPR
High severity7.4NVD Advisory· Published Apr 9, 2026· Updated Apr 23, 2026

CVE-2026-33797

CVE-2026-33797

Description

An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS).

An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS:

  • 25.2 versions before 25.2R2

This issue does not affect Junos OS versions before 25.2R1.

This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO

This issue does not affect Junos OS Evolved versions before 25.2R1-EVO.

eBGP and iBGP are affected. IPv4 and IPv6 are affected.

Affected products

8
  • cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:*
  • cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:*
    • cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.