CVE-2026-33783
Gravedad CVSS v4.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/04/2026
Última modificación:
09/04/2026
Descripción
*** Pendiente de traducción *** A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS).<br />
<br />
<br />
If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn&#39;t restart which leads to a complete and persistent service impact. The system has to be manually restarted to recover. The issue is seen only when the Originator ASN field in PCEP contains a value larger than 65,535 (32-bit ASN). The issue is not reproducible when SRTE policy tunnels are statically configured.<br />
<br />
<br />
This issue affects Junos OS Evolved on PTX Series: <br />
<br />
<br />
<br />
* all versions before 22.4R3-S9-EVO,<br />
* 23.2 versions before 23.2R2-S6-EVO,<br />
* 23.4 versions before 23.4R2-S7-EVO,<br />
* 24.2 versions before 24.2R2-S4-EVO,<br />
* 24.4 versions before 24.4R2-S2-EVO,<br />
* 25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.
Impacto
Puntuación base 4.0
7.10
Gravedad 4.0
ALTA
Puntuación base 3.x
6.50
Gravedad 3.x
MEDIA



