7.1

CVE-2026-33781

Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed

An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS).

On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS:



  *  24.4 releases before 24.4R2,
  *  25.2 releases before 25.2R1-S1, 25.2R2.




This issue does not affect Junos OS releases before 24.4R1.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version24.4 Update-
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version24.4 Updater1
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version24.4 Updater1-s2
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version24.4 Updater1-s3
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version25.2 Update-
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version25.2 Updater1
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
JuniperJunos Version25.2 Updater2
   JuniperEx4000 Version-
   JuniperEx4100 Version-
   JuniperEx4100-f Version-
   JuniperEx4100-h Version-
   JuniperEx4300 Version-
   JuniperEx4400 Version-
   JuniperEx4600 Version-
   JuniperEx4650 Version-
   JuniperQfx5110 Version-
   JuniperQfx5120 Version-
   JuniperQfx5130 Version-
   JuniperQfx5200 Version-
   JuniperQfx5210 Version-
   JuniperQfx5220 Version-
   JuniperQfx5230-64cd Version-
   JuniperQfx5240 Version-
   JuniperQfx5241 Version-
   JuniperQfx5700 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
sirt@juniper.net 7.1 0 0
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:M/U:X
CWE-754 Improper Check for Unusual or Exceptional Conditions

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.