Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2809 articles · 109660 vulns · 38/41 feeds (7d)
← Back to list
7.4
CVE-2026-33797PATCHED
juniper · junos os

Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset

Description

An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue doesn't not affected Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected.

Affected Products

VendorProductVersions
juniperjunos os25.2, 25.2

References

  • https://kb.juniper.net/JSA107850(vendor-advisory)
CVSS 3.17.4 HIGH
VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
25.2R2025.2R2-EVO
CWECWE-20
PublishedApr 9, 2026
Trending Score0
Source articles0
Independent0
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2025-30650
Junos OS: Privileged local user can gain access to a Linux-based FPC as root
Trending: 41
PRE-CVE
Multiple vulnerabilities in Juniper Networks products including Junos OS and Apstra
Trending: 20
HIGHCVE-2026-33790
Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 packet will cause the srxpfe process to crash and restart.
CRITICALCVE-2026-33784
JSI Virtual Lightweight Collector: Default password is not required to be changed which allows unauthorized high-privileged access
MEDIUMCVE-2026-33787
Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Patch Available
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026