Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS).

On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS:



* 24.4 releases before 24.4R2,
* 25.2 releases before 25.2R1-S1, 25.2R2.




This issue does not affect Junos OS releases before 24.4R1.
Published: 2026-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates in the packet forwarding engine of Juniper Networks Junos OS and is triggered when specific control protocol packets—VSTP Bridge Protocol Data Units (BPDUs)—are received on a UNI interface in a VXLAN configuration. Processing these BPDUs causes packet buffer allocation failures that lead to memory leaks and ultimately prevent the device from forwarding traffic. Because the flaw is an improper check for unusual or exceptional conditions, an attacker with no authentication who is in the local network segment can induce a full denial of service by simply sending the offending packets. The attacker gains no other privileges; the impact is limited to interrupting connectivity for all traffic passing through the affected device. The flaw is present in older releases of Junos OS that run on EX4k and QFX5k service‑provider edge devices. Versions prior to 24.4R2 in the 24.4 release line and prior to 25.2R1‑S1 or 25.2R2 in the 25.2 line are vulnerable. Devices running Junos OS releases before 24.4R1 are not affected. Risk assessment indicates a medium‑high severity with a CVSS score of 7.1. Exploit probability data is not provisioned, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is an unauthenticated network adversary adjacent to the device, sending crafted VSTP BPDUs over the UNI interface. The attack requires no special access privileges beyond network proximity, making the threat potentially realistic in shared or multi‑tenant environments.

Affected Systems

Juniper Networks Junos OS running on EX and QFX Series devices, specifically EX4k and QFX5k platforms configured as service‑provider edge devices with Layer‑2 Protocol Tunneling enabled on the UNI and VSTP enabled on the NNI in VXLAN scenarios. Vulnerable releases include 24.4 versions earlier than 24.4R2 and 25.2 versions earlier than 25.2R1‑S1 or 25.2R2; earlier releases before 24.4R1 are not affected.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.1, signifying a considerable impact on availability. Since EPSS data is not available, the exact exploitation likelihood remains uncertain, but the lack of authentication requirements and the requirement only for proximity to the target machine heighten the real‑world risk. The vulnerability is not yet catalogued as a known exploited vulnerability by CISA, which may indicate limited public exploitation but does not rule out the possibility that attackers have discovered or are experimenting with the flaw. The attack path is straightforward: an adjacent attacker sends VSTP BPDUs to the UNI interface, which the device processes and then fails to forward traffic, causing a denial of service until the device is restarted.

Generated by OpenCVE AI on April 9, 2026 at 23:25 UTC.

Remediation

Vendor Solution

The following software releases have been updated to resolve this specific issue: 24.4R2, 25.2R1-S1, 25.2R2, 25.4R1, and all subsequent releases.


Vendor Workaround

To prevent VSTP BPDUs from being processed on UNI interfaces configure: [ protocols layer2-control bpdu-block interface all drop ]


OpenCVE Recommended Actions

  • Update Junos OS to release 24.4R2 or later, or 25.2R1‑S1/25.2R2 or newer versions, to remove the vulnerability.
  • If an update is not immediately possible, configure the device to block VSTP BPDUs on all UNI interfaces: protocols layer2-control bpdu-block interface all drop.
  • After applying the configuration change, restart the device to clear any residual memory leaks.
  • Verify that traffic resumes normally and monitor for repeated buffer allocation failures.
  • Stay current with future Junos OS releases and security advisories from Juniper Networks.

Generated by OpenCVE AI on April 9, 2026 at 23:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Fri, 17 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper
Juniper ex4000
Juniper ex4100
Juniper ex4100-f
Juniper ex4100-h
Juniper ex4300
Juniper ex4400
Juniper ex4600
Juniper ex4650
Juniper junos
Juniper qfx5110
Juniper qfx5120
Juniper qfx5130
Juniper qfx5200
Juniper qfx5210
Juniper qfx5220
Juniper qfx5230-64cd
Juniper qfx5240
Juniper qfx5241
Juniper qfx5700
CPEs cpe:2.3:h:juniper:ex4000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4100-h:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5230-64cd:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5240:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5241:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5700:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:24.4:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:25.2:r2:*:*:*:*:*:*
Vendors & Products Juniper
Juniper ex4000
Juniper ex4100
Juniper ex4100-f
Juniper ex4100-h
Juniper ex4300
Juniper ex4400
Juniper ex4600
Juniper ex4650
Juniper junos
Juniper qfx5110
Juniper qfx5120
Juniper qfx5130
Juniper qfx5200
Juniper qfx5210
Juniper qfx5220
Juniper qfx5230-64cd
Juniper qfx5240
Juniper qfx5241
Juniper qfx5700

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper Networks
Juniper Networks junos Os
Vendors & Products Juniper Networks
Juniper Networks junos Os

Thu, 09 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Description An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS). On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS: * 24.4 releases before 24.4R2, * 25.2 releases before 25.2R1-S1, 25.2R2. This issue does not affect Junos OS releases before 24.4R1.
Title Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed
Weaknesses CWE-754
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/RE:M'}


Subscriptions

Juniper Ex4000 Ex4100 Ex4100-f Ex4100-h Ex4300 Ex4400 Ex4600 Ex4650 Junos Qfx5110 Qfx5120 Qfx5130 Qfx5200 Qfx5210 Qfx5220 Qfx5230-64cd Qfx5240 Qfx5241 Qfx5700
Juniper Networks Junos Os
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2026-04-10T14:10:08.812Z

Reserved: 2026-03-23T19:46:13.669Z

Link: CVE-2026-33781

cve-icon Vulnrichment

Updated: 2026-04-10T14:10:03.940Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T22:16:27.193

Modified: 2026-04-17T17:53:32.403

Link: CVE-2026-33781

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:52Z

Weaknesses