Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS).

On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS:



* 24.4 releases before 24.4R2,
* 25.2 releases before 25.2R1-S1, 25.2R2.




This issue does not affect Junos OS releases before 24.4R1.
Published: 2026-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates in the packet forwarding engine of Juniper Networks Junos OS and is triggered when specific control protocol packets—VSTP Bridge Protocol Data Units (BPDUs)—are received on a UNI interface in a VXLAN configuration. Processing these BPDUs causes packet buffer allocation failures that lead to memory leaks and ultimately prevent the device from forwarding traffic. Because the flaw is an improper check for unusual or exceptional conditions, an attacker with no authentication who is in the local network segment can induce a full denial of service by simply sending the offending packets. The attacker gains no other privileges; the impact is limited to interrupting connectivity for all traffic passing through the affected device. The flaw is present in older releases of Junos OS that run on EX4k and QFX5k service‑provider edge devices. Versions prior to 24.4R2 in the 24.4 release line and prior to 25.2R1‑S1 or 25.2R2 in the 25.2 line are vulnerable. Devices running Junos OS releases before 24.4R1 are not affected. Risk assessment indicates a medium‑high severity with a CVSS score of 7.1. Exploit probability data is not provisioned, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is an unauthenticated network adversary adjacent to the device, sending crafted VSTP BPDUs over the UNI interface. The attack requires no special access privileges beyond network proximity, making the threat potentially realistic in shared or multi‑tenant environments.

Affected Systems

Juniper Networks Junos OS running on EX and QFX Series devices, specifically EX4k and QFX5k platforms configured as service‑provider edge devices with Layer‑2 Protocol Tunneling enabled on the UNI and VSTP enabled on the NNI in VXLAN scenarios. Vulnerable releases include 24.4 versions earlier than 24.4R2 and 25.2 versions earlier than 25.2R1‑S1 or 25.2R2; earlier releases before 24.4R1 are not affected.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.1, signifying a considerable impact on availability. Since EPSS data is not available, the exact exploitation likelihood remains uncertain, but the lack of authentication requirements and the requirement only for proximity to the target machine heighten the real‑world risk. The vulnerability is not yet catalogued as a known exploited vulnerability by CISA, which may indicate limited public exploitation but does not rule out the possibility that attackers have discovered or are experimenting with the flaw. The attack path is straightforward: an adjacent attacker sends VSTP BPDUs to the UNI interface, which the device processes and then fails to forward traffic, causing a denial of service until the device is restarted.

Generated by OpenCVE AI on April 9, 2026 at 23:25 UTC.

Remediation

Vendor Solution

The following software releases have been updated to resolve this specific issue: 24.4R2, 25.2R1-S1, 25.2R2, 25.4R1, and all subsequent releases.


Vendor Workaround

To prevent VSTP BPDUs from being processed on UNI interfaces configure: [ protocols layer2-control bpdu-block interface all drop ]


OpenCVE Recommended Actions

  • Update Junos OS to release 24.4R2 or later, or 25.2R1‑S1/25.2R2 or newer versions, to remove the vulnerability.
  • If an update is not immediately possible, configure the device to block VSTP BPDUs on all UNI interfaces: protocols layer2-control bpdu-block interface all drop.
  • After applying the configuration change, restart the device to clear any residual memory leaks.
  • Verify that traffic resumes normally and monitor for repeated buffer allocation failures.
  • Stay current with future Junos OS releases and security advisories from Juniper Networks.

Generated by OpenCVE AI on April 9, 2026 at 23:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper Networks
Juniper Networks junos Os
Vendors & Products Juniper Networks
Juniper Networks junos Os

Thu, 09 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS). On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS: * 24.4 releases before 24.4R2, * 25.2 releases before 25.2R1-S1, 25.2R2. This issue does not affect Junos OS releases before 24.4R1.
Title Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed
Weaknesses CWE-754
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/RE:M'}


Subscriptions

Juniper Networks Junos Os
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2026-04-10T14:10:08.812Z

Reserved: 2026-03-23T19:46:13.669Z

Link: CVE-2026-33781

cve-icon Vulnrichment

Updated: 2026-04-10T14:10:03.940Z

cve-icon NVD

Status : Received

Published: 2026-04-09T22:16:27.193

Modified: 2026-04-09T22:16:27.193

Link: CVE-2026-33781

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:52Z

Weaknesses