CVE-2026-33774

CWE-7543 documents3 sources
Severity
6.9MEDIUM
EPSS
0.0%
top 92.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateApr 10

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and access the control-plane of the device. On MX platforms with MPC10, MPC11, LC4800 or LC9600 line cards, and MX304, firewall filters applied on a loopback interface lo0.n (where n is a non-0 number) don't get executed when lo0.n is in the global VRF / d

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages1 packages

CVEListV5juniper_networks/junos_os23.423.4R2-S7+3

🔴Vulnerability Details

2
GHSA
GHSA-3p5v-chx4-4483: An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series2026-04-10
CVEList
Junos OS: MX Series: Firewall filters on lo0.<non-0> in the default routing instance are not in effect2026-04-09
CVE-2026-33774 (MEDIUM CVSS 6.9) | An Improper Check for Unusual or Ex | cvebase.io