CVE-2026-33774
Gravedad CVSS v4.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/04/2026
Última modificación:
09/04/2026
Descripción
*** Pendiente de traducción *** An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and access the control-plane of the device.<br />
<br />
On MX platforms with <br />
<br />
MPC10, MPC11, LC4800 or LC9600<br />
<br />
line cards, and MX304, firewall filters applied on a loopback interface lo0.n (where n is a non-0 number) don&#39;t get executed when lo0.n is in the global VRF / default routing-instance.<br />
<br />
An affected configuration would be:<br />
<br />
user@host# show configuration interfaces lo0 | display set<br />
set interfaces lo0 unit 1 family inet filter input <br />
<br />
where a firewall filter is applied to a non-0 loopback interface, but that loopback interface is not referred to in any routing-instance (RI) configuration, which implies that it&#39;s used in the default RI.<br />
<br />
The issue can be observed with the CLI command:<br />
<br />
user@device> show firewall counter filter <br />
<br />
not showing any matches.<br />
<br />
This issue affects Junos OS on MX Series:<br />
<br />
* all versions before 23.2R2-S6,<br />
* 23.4 versions before 23.4R2-S7,<br />
* 24.2 versions before 24.2R2,<br />
* 24.4 versions before 24.4R2.
Impacto
Puntuación base 4.0
6.90
Gravedad 4.0
MEDIA
Puntuación base 3.x
6.50
Gravedad 3.x
MEDIA



