CVE-2026-33797
Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset
An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue doesn't not affected Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected.
| CWE | CWE-20 |
| Vendor | juniper networks |
| Product | junos os |
| Published | Apr 9, 2026 |
| Last Updated | Apr 13, 2026 |
Get instant alerts for juniper networks junos os
Be the first to know when new high vulnerabilities affecting juniper networks junos os are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H