Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-33774

Gravedad CVSS v4.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/04/2026
Última modificación:
09/04/2026

Descripción

*** Pendiente de traducción *** An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and access the control-plane of the device.<br /> <br /> On MX platforms with <br /> <br /> MPC10, MPC11, LC4800 or LC9600<br /> <br /> line cards, and MX304, firewall filters applied on a loopback interface lo0.n (where n is a non-0 number) don&amp;#39;t get executed when lo0.n is in the global VRF / default routing-instance.<br /> <br /> An affected configuration would be:<br /> <br /> user@host# show configuration interfaces lo0 | display set<br /> set interfaces lo0 unit 1 family inet filter input <br /> <br /> where a firewall filter is applied to a non-0 loopback interface, but that loopback interface is not referred to in any routing-instance (RI) configuration, which implies that it&amp;#39;s used in the default RI.<br /> <br /> The issue can be observed with the CLI command:<br /> <br /> user@device&gt; show firewall counter filter <br /> <br /> not showing any matches.<br /> <br /> This issue affects Junos OS on MX Series:<br /> <br /> * all versions before 23.2R2-S6,<br /> * 23.4 versions before 23.4R2-S7,<br /> * 24.2 versions before 24.2R2,<br /> * 24.4 versions before 24.4R2.

Referencias a soluciones, herramientas e información