CVE-2026-33783 — Function Call With Incorrect Argument Type in Networks Junos OS Evolved
Severity
7.1HIGHNVD
EPSS
0.1%
top 84.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateApr 13
Description
A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS).
If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system has to be manually restarted to r…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
Affected Packages1 packages
🔴Vulnerability Details
3VulDB▶
Juniper Junos OS Evolved up to 23.1/23.3/24.1/24.3/25.1 on PTX Sensor Interface Incorrect function call with incorrect argument type (JSA107870 / Nessus ID 305593)↗2026-04-13
GHSA▶
GHSA-q83c-r2qf-fvp6: A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network↗2026-04-10
CVEList▶
Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftmand crashes↗2026-04-09