CVE-2026-33783

MEDIUM

Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftmand crashes

Title source: cna
STIX 2.1

Description

A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS). If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system has to be manually restarted to recover. The issue is seen only when the Originator ASN field in PCEP contains a value larger than 65,535 (32-bit ASN). The issue is not reproducible when SRTE policy tunnels are statically configured. This issue affects Junos OS Evolved on PTX Series:  * all versions before 22.4R3-S9-EVO, * 23.2 versions before 23.2R2-S6-EVO, * 23.4 versions before 23.4R2-S7-EVO, * 24.2 versions before 24.2R2-S4-EVO, * 24.4 versions before 24.4R2-S2-EVO, * 25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.

References (1)

Core 1
Core References
Vendor Advisory vendor-advisory
https://kb.juniper.net/JSA107870

Scores

CVSS v3 6.5
EPSS 0.0006
EPSS Percentile 19.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-686
Status published
Products (6)
juniper/junos_os_evolved 22.4 (15 CPE variants)
juniper/junos_os_evolved 23.2 (10 CPE variants)
juniper/junos_os_evolved 23.4 (11 CPE variants)
juniper/junos_os_evolved 24.2 (7 CPE variants)
juniper/junos_os_evolved 24.4 (6 CPE variants)
juniper/junos_os_evolved 25.2
Published Apr 09, 2026
Tracked Since Apr 10, 2026