CVE-2026-33797
Description
An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS).
An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS:
* 25.2 versions before 25.2R2
This issue doesn't not affected Junos OS versions before 25.2R1.
This issue affects Junos OS Evolved:
* 25.2-EVO versions before 25.2R2-EVO
This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO.
eBGP and iBGP are affected.
IPv4 and IPv6 are affected.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 7 Days)
Improper Input Validation
StableCommon Consequences
Applicable Platforms
Junos Os Evolved by Juniper
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:*
Junos by Juniper
cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:*
Junos by Juniper
cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
Junos by Juniper
cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:*
Junos Os Evolved by Juniper
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:*
Junos Os Evolved by Juniper
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:*
Junos by Juniper
cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
Junos Os Evolved by Juniper
cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*