NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-33797
Summary

An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS).

An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS:

* 25.2 versions before 25.2R2

This issue doesn't not affected Junos OS versions before 25.2R1.

This issue affects Junos OS Evolved:
* 25.2-EVO versions before 25.2R2-EVO

This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO.

eBGP and iBGP are affected.
IPv4 and IPv6 are affected.

Publication Date April 10, 2026, 7:16 a.m.
Registration Date April 15, 2026, 11:35 a.m.
Last Update April 17, 2026, 3:37 a.m.
CVSS3.1 : HIGH
スコア 7.4
Vector CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更あり
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List