CVE-2026-33797
Description
An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS).
An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS:
- 25.2 versions before 25.2R2
This issue does not affect Junos OS versions before 25.2R1.
This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO
This issue does not affect Junos OS Evolved versions before 25.2R1-EVO.
eBGP and iBGP are affected. IPv4 and IPv6 are affected.
Affected products
8cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- kb.juniper.net/JSA107850nvdVendor Advisory
- supportportal.juniper.net/JSA107850nvd
News mentions
0No linked articles in our index yet.