Vulnerability Details CVE-2026-33783
A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS).
If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system has to be manually restarted to recover. The issue is seen only when the Originator ASN field in PCEP contains a value larger than 65,535 (32-bit ASN). The issue is not reproducible when SRTE policy tunnels are statically configured.
This issue affects Junos OS Evolved on PTX Series:
* all versions before 22.4R3-S9-EVO,
* 23.2 versions before 23.2R2-S6-EVO,
* 23.4 versions before 23.4R2-S7-EVO,
* 24.2 versions before 24.2R2-S4-EVO,
* 24.4 versions before 24.4R2-S2-EVO,
* 25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.0%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2026-33783
-
cpe:2.3:h:juniper:ptx10001-36mr:-
-
cpe:2.3:h:juniper:ptx10002-36qdd:-
-
cpe:2.3:h:juniper:ptx10003:-
-
cpe:2.3:h:juniper:ptx10004:-
-
cpe:2.3:h:juniper:ptx10008:-
-
cpe:2.3:h:juniper:ptx10016:-
-
cpe:2.3:h:juniper:ptx12008:-
-
cpe:2.3:o:juniper:junos_os_evolved:*
-
cpe:2.3:o:juniper:junos_os_evolved:22.4
-
cpe:2.3:o:juniper:junos_os_evolved:23.2
-
cpe:2.3:o:juniper:junos_os_evolved:23.4
-
cpe:2.3:o:juniper:junos_os_evolved:24.2
-
cpe:2.3:o:juniper:junos_os_evolved:24.4
-
cpe:2.3:o:juniper:junos_os_evolved:25.2