CVE-2026-33778
Severity
8.7HIGH
EPSS
0.1%
top 81.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateApr 13
Description
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of-Service (DoS).
If an affected device receives a specifically malformed first ISAKMP packet from the initiator, the kmd/iked process will crash and restart, which momentarily prevents new security associations (SAs) for from being established. Repeat…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
Affected Packages1 packages
🔴Vulnerability Details
3VulDB▶
Juniper Junos OS up to 25.2R1-S2 kmd/iked improper validation of syntactic correctness of input (JSA107868 / Nessus ID 305590)↗2026-04-13
GHSA▶
GHSA-q559-6pc6-gxfh: An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX S↗2026-04-10
CVEList▶
Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is received kmd/iked crashes↗2026-04-09