CVE-2026-33781

MEDIUM

Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed

Title source: cna
STIX 2.1

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS). On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS: * 24.4 releases before 24.4R2, * 25.2 releases before 25.2R1-S1, 25.2R2. This issue does not affect Junos OS releases before 24.4R1.

Scores

CVSS v3 6.5
EPSS 0.0002
EPSS Percentile 6.3%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-754
Status published
Products (5)
juniper/junos 24.4 (4 CPE variants)
juniper/junos 25.2 (3 CPE variants)
Juniper Networks/Junos OS < 24.4R1
Juniper Networks/Junos OS 24.4 - 24.4R2
Juniper Networks/Junos OS 25.2 - 25.2R1-S1, 25.2R2
Published Apr 09, 2026
Tracked Since Apr 10, 2026