NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-33783
Summary

A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS).

If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system has to be manually restarted to recover. The issue is seen only when the Originator ASN field in PCEP contains a value larger than 65,535 (32-bit ASN). The issue is not reproducible when SRTE policy tunnels are statically configured.

This issue affects Junos OS Evolved on PTX Series: 

* all versions before 22.4R3-S9-EVO,
* 23.2 versions before 23.2R2-S6-EVO,
* 23.4 versions before 23.4R2-S7-EVO,
* 24.2 versions before 24.2R2-S4-EVO,
* 24.4 versions before 24.4R2-S2-EVO,
* 25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.

Publication Date April 10, 2026, 7:16 a.m.
Registration Date April 15, 2026, 11:35 a.m.
Last Update April 18, 2026, 3:27 a.m.
CVSS3.1 : MEDIUM
スコア 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* 22.4
cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.2:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:24.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:25.2:r2:*:*:*:*:*:*
Configuration2 or higher or less more than less than
Related information, measures and tools
Common Vulnerabilities List