Metrics
Affected Vendors & Products
Thu, 23 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue doesn't not affected Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected. | An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue does not affect Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue does not affect Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected. |
| References |
|
Thu, 16 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos Juniper junos Os Evolved |
|
| CPEs | cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper junos Juniper junos Os Evolved |
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper Networks
Juniper Networks junos Os Juniper Networks junos Os Evolved |
|
| Vendors & Products |
Juniper Networks
Juniper Networks junos Os Juniper Networks junos Os Evolved |
Thu, 09 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue doesn't not affected Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected. | |
| Title | Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: juniper
Published: 2026-04-09T21:31:22.902Z
Updated: 2026-04-23T20:08:35.655Z
Reserved: 2026-03-23T19:46:13.673Z
Link: CVE-2026-33797
Updated: 2026-04-13T17:58:31.693Z
Status : Modified
Published: 2026-04-09T22:16:29.547
Modified: 2026-04-23T21:16:05.677
Link: CVE-2026-33797
No data.
ReportizFlow