CVE-2026-33778

CWE-12864 documents4 sources
Severity
8.7HIGH
EPSS
0.1%
top 81.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateApr 13

Description

An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of-Service (DoS). If an affected device receives a specifically malformed first ISAKMP packet from the initiator, the kmd/iked process will crash and restart, which momentarily prevents new security associations (SAs) for from being established. Repeat

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages1 packages

CVEListV5juniper_networks/junos_os23.223.2R2-S6+5

🔴Vulnerability Details

3
VulDB
Juniper Junos OS up to 25.2R1-S2 kmd/iked improper validation of syntactic correctness of input (JSA107868 / Nessus ID 305590)2026-04-13
GHSA
GHSA-q559-6pc6-gxfh: An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX S2026-04-10
CVEList
Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is received kmd/iked crashes2026-04-09
CVE-2026-33778 (HIGH CVSS 8.7) | An Improper Validation of Syntactic | cvebase.io