[CIVN-2026-0187] Multiple Vulnerabilities in Juniper Junos OS

By Published On: April 16, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Juniper Junos OS


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Junos OS Evolved on PTX Series: 

all versions before 22.4R3-S9-EVO

23.2 versions before 23.2R2-S6-EVO

23.4 versions before 23.4R2-S7-EVO

24.2 versions before 24.2R2-S4-EVO

24.4 versions before 24.4R2-S2-EVO

25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.

Junos OS:

all versions before 22.4R3-S1

23.2 versions before 23.2R2

23.4 versions before 23.4R2.

Overview


Multiple vulnerabilities have been reported in Juniper Junos OS which could allow an attacker to gain elevated privileges or cause denial-of-service (DoS) on the targeted system.


Target Audience:

All end-user organizations and individuals using Juniper Junos OS.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


Juniper Junos OS is a network operating system used in Juniper Networks routers, switches, and security devices.


These vulnerabilities exist in Juniper Junos OS due to an incorrect argument type handling in the sensor interface of Junos OS Evolved on PTX Series devices and improper memory management (failure to release memory after use) in the jdhcpd daemon on Junos OS (MX Series). A remote attacker could exploit these vulnerabilities by persuading a specially crafted request to gain elevated privileges on the targeted system.


Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to gain elevated privileges or cause denial-of-service (DoS) on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor


Vendor Information


Juniper Junos OS

https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783


References


Juniper Junos OS

https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783


CVE Name

CVE-2026-33782

CVE-2026-33783




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmng9zcACgkQ3jCgcSdc

ys8/txAAirDi2HjF1/xPKyYen+UkGQIlXP8igCSPFkEI+3WYS5XQaos3WrFX2Dvw

QrXDlIlPe6hs/rdaV1JPKHDiw5/+gu4DPERZWMDxgo46iuOqjUNPPSnCGcbMIpI1

spfQGBRx9x7GJsBcyH6Tjc8UvI7qZ/r91NOH/Ilr45uzLGlM8IgZtRFuXkeSbGae

HtOxtS/AQ3o4dRO6jdDQT0IZeM6H8/XAqAqwtEeb1HCPgXdGfXueKHLXl/vQ9rQu

pahOvHryGz8WIm8puVfvbVUAdk3OE4Ii1BzUmO/xowvmtWpQ5JI93/b9FewCOAXj

NxVMysRT/yRv6NiOH6R+pbzUc55z6BC1hss+gzbQnXeP9i8IL/c8HfE5Ftu0B6hf

l7zZ0r9Ak7ygOObLCa2zyRqiRz1RAovMy8kUAdK846npR24cXyiTaQoft4IA5KCZ

HKlbVvCMhWqsEhT3pJkwH7ZoTHlCIvRQ7FifAjvBFjcJ6v3bjF5aaxCi2ocnjfPd

AS98CO8DtjmvRd7QI5JXho/S8lIsws78M4UK/lXrJ7L/AbCzGa8L/gCJ4xs8pUc7

dMDt9KFxBOGts7YVhIDmaCNn+vWO2J2N5INM200z2qQdoFPm0K091Jt0ZlmdSKMX

gR4ReO6gn22UJ9UKrYU75AfljJBWokNBgiaa8iEojWZyxhKKsf0=

=dCrE

—–END PGP SIGNATURE—–

Share this article