6.9

CVE-2026-33773

Junos OS: EX Series, QFX Series: If the same egress filter is configured on both an IRB and a physical interface one of those is not applied

An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to downstream networks.

When the same family inet or inet6 filter is applied on an IRB interface and on a physical interface as egress filter on EX4100, EX4400, EX4650 and QFX5120 devices, only one of the two filters will be applied, which can lead to traffic being sent out one of these interfaces which should have been blocked.

This issue affects Junos OS on EX Series and QFX Series:
  *  23.4 version 23.4R2-S6,
  *  24.2 version 24.2R2-S3.


No other Junos OS versions are affected.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version23.4 Updater2-s6
   JuniperEx2300 Version-
   JuniperEx2300-c Version-
   JuniperEx3400 Version-
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperEx9204 Version-
   JuniperEx9208 Version-
   JuniperEx9214 Version-
   JuniperQfx10008 Version-
   JuniperQfx10016 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version24.2 Updater2-s3
   JuniperEx2300 Version-
   JuniperEx2300-c Version-
   JuniperEx3400 Version-
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperEx9204 Version-
   JuniperEx9208 Version-
   JuniperEx9214 Version-
   JuniperQfx10008 Version-
   JuniperQfx10016 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.157
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 5.8 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
sirt@juniper.net 6.9 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X
Es wurden noch keine Informationen zu CWE veröffentlicht.