CVE-2026-33775

MEDIUM

Junos OS: MX Series: Mismatch between configured and received packet types causes memory leak in bbe-smgd

Title source: cna
STIX 2.1

Description

A Missing Release of Memory after Effective Lifetime vulnerability in the BroadBand Edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). If the authentication packet-type option is configured and a received packet does not match that packet type, the memory leak occurs. When all memory available to bbe-smgd has been consumed, no new subscribers will be able to login. The memory utilization of bbe-smgd can be monitored with the following show command: user@host> show system processes extensive | match bbe-smgd The below log message can be observed when this limit has been reached: bbesmgd[<PID>]: %DAEMON-3-SMD_DPROF_RSMON_ERROR: Resource unavailability, Reason: Daemon Heap Memory exhaustion This issue affects Junos OS on MX Series: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2, * 25.2 versions before 25.2R2.

Scores

CVSS v3 6.5
EPSS 0.0003
EPSS Percentile 8.0%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-401
Status published
Products (8)
juniper/junos 22.4 (15 CPE variants)
juniper/junos 23.2 (9 CPE variants)
juniper/junos 23.4 (10 CPE variants)
juniper/junos 24.2 (6 CPE variants)
juniper/junos 24.4 (4 CPE variants)
juniper/junos 25.2 (4 CPE variants)
juniper/junos < 22.4
Juniper Networks/Junos OS < 22.4R3-S8
Published Apr 09, 2026
Tracked Since Apr 10, 2026