
[CIVN-2026-0187] Multiple Vulnerabilities in Juniper Junos OS
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Juniper Junos OS
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Junos OS Evolved on PTX Series:
all versions before 22.4R3-S9-EVO
23.2 versions before 23.2R2-S6-EVO
23.4 versions before 23.4R2-S7-EVO
24.2 versions before 24.2R2-S4-EVO
24.4 versions before 24.4R2-S2-EVO
25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.
Junos OS:
all versions before 22.4R3-S1
23.2 versions before 23.2R2
23.4 versions before 23.4R2.
Overview
Multiple vulnerabilities have been reported in Juniper Junos OS which could allow an attacker to gain elevated privileges or cause denial-of-service (DoS) on the targeted system.
Target Audience:
All end-user organizations and individuals using Juniper Junos OS.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
Juniper Junos OS is a network operating system used in Juniper Networks routers, switches, and security devices.
These vulnerabilities exist in Juniper Junos OS due to an incorrect argument type handling in the sensor interface of Junos OS Evolved on PTX Series devices and improper memory management (failure to release memory after use) in the jdhcpd daemon on Junos OS (MX Series). A remote attacker could exploit these vulnerabilities by persuading a specially crafted request to gain elevated privileges on the targeted system.
Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to gain elevated privileges or cause denial-of-service (DoS) on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor
Vendor Information
Juniper Junos OS
https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783
References
Juniper Junos OS
https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783
CVE Name
CVE-2026-33782
CVE-2026-33783
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=dCrE
—–END PGP SIGNATURE—–


