An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS:
* 25.2 versions before 25.2R2
This issue doesn't not affected Junos OS versions before 25.2R1.
This issue affects Junos OS Evolved:
* 25.2-EVO versions before 25.2R2-EVO
This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO.
eBGP and iBGP are affected.
IPv4 and IPv6 are affected.
Project Subscriptions
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Junos OS: 25.2R2, 25.4R1, and all subsequent releases. Junos OS Evolved: 25.2R2-EVO, 25.4R1-EVO, and all subsequent releases.
Workaround
There are no known workarounds for this issue.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA107850 |
|
Thu, 16 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos Juniper junos Os Evolved |
|
| CPEs | cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:25.2:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper junos Juniper junos Os Evolved |
Mon, 13 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper Networks
Juniper Networks junos Os Juniper Networks junos Os Evolved |
|
| Vendors & Products |
Juniper Networks
Juniper Networks junos Os Juniper Networks junos Os Evolved |
Thu, 09 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedly sending the packet will sustain the Denial of Service (DoS).This issue affects Junos OS: * 25.2 versions before 25.2R2 This issue doesn't not affected Junos OS versions before 25.2R1. This issue affects Junos OS Evolved: * 25.2-EVO versions before 25.2R2-EVO This issue doesn't not affected Junos OS Evolved versions before 25.2R1-EVO. eBGP and iBGP are affected. IPv4 and IPv6 are affected. | |
| Title | Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2026-04-13T18:06:19.434Z
Reserved: 2026-03-23T19:46:13.673Z
Link: CVE-2026-33797
Updated: 2026-04-13T17:58:31.693Z
Status : Analyzed
Published: 2026-04-09T22:16:29.547
Modified: 2026-04-16T18:37:54.430
Link: CVE-2026-33797
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:27:58Z