CVE-2026-33783Function Call With Incorrect Argument Type in Networks Junos OS Evolved

Severity
7.1HIGHNVD
EPSS
0.1%
top 84.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateApr 13

Description

A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS). If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system has to be manually restarted to r

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages1 packages

CVEListV5juniper_networks/junos_os_evolved23.223.2R2-S6-EVO+5

🔴Vulnerability Details

3
VulDB
Juniper Junos OS Evolved up to 23.1/23.3/24.1/24.3/25.1 on PTX Sensor Interface Incorrect function call with incorrect argument type (JSA107870 / Nessus ID 305593)2026-04-13
GHSA
GHSA-q83c-r2qf-fvp6: A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network2026-04-10
CVEList
Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftmand crashes2026-04-09
CVE-2026-33783 — HIGH severity | cvebase