An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS).
An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS:
* 25.2 versions before 25.2R2
This issue does not affect Junos OS versions before 25.2R1.
This issue affects Junos OS Evolved:
* 25.2-EVO versions before 25.2R2-EVO
This issue does not affect Junos OS Evolved versions before 25.2R1-EVO.
eBGP and iBGP are affected.
IPv4 and IPv6 are affected.
References
| Link | Resource |
|---|---|
| https://kb.juniper.net/JSA107850 | Vendor Advisory |
| https://supportportal.juniper.net/JSA107850 |
Configurations
Configuration 1 (hide)
|
History
23 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue does not affect Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue does not affect Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected. |
16 Apr 2026, 18:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Juniper junos
Juniper Juniper junos Os Evolved |
|
| References | () https://kb.juniper.net/JSA107850 - Vendor Advisory | |
| CPE | cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:* |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-23 21:16
NVD link : CVE-2026-33797
Mitre link : CVE-2026-33797
CVE.ORG link : CVE-2026-33797
JSON object : View
Products Affected
juniper
- junos_os_evolved
- junos
CWE
CWE-20
Improper Input Validation
