CVE-2026-33797
HIGHJunos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset
Title source: cnaDescription
An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue does not affect Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue does not affect Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected.
Scores
CVSS v3
7.4
EPSS
0.0004
EPSS Percentile
12.3%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
Status
published
Products (6)
juniper/junos
25.2 (4 CPE variants)
juniper/junos_os_evolved
25.2 (4 CPE variants)
Juniper Networks/Junos OS
< 25.2R1
Juniper Networks/Junos OS
25.2 - 25.2R2
Juniper Networks/Junos OS Evolved
< 25.2R1-EVO
Juniper Networks/Junos OS Evolved
25.2 - 25.2R2-EVO
Published
Apr 09, 2026
Tracked Since
Apr 10, 2026