CVE-2026-33774 PUBLISHED

Junos OS: MX Series: Firewall filters on lo0.<non-0> in the default routing instance are not in effect

Assigner: juniper
Reserved: 23.03.2026 Published: 09.04.2026 Updated: 10.04.2026

An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and access the control-plane of the device.

On MX platforms with

MPC10, MPC11, LC4800 or LC9600

line cards, and MX304, firewall filters applied on a loopback interface lo0.n (where n is a non-0 number) don't get executed when lo0.n is in the global VRF / default routing-instance.

An affected configuration would be:

user@host# show configuration interfaces lo0 | display set set interfaces lo0 unit 1 family inet filter input <filter-name>

where a firewall filter is applied to a non-0 loopback interface, but that loopback interface is not referred to in any routing-instance (RI) configuration, which implies that it's used in the default RI.

The issue can be observed with the CLI command:

user@device> show firewall counter filter <filter_name>

not showing any matches.

This issue affects Junos OS on MX Series:

  • all versions before 23.2R2-S6,
  • 23.4 versions before 23.4R2-S7,
  • 24.2 versions before 24.2R2,
  • 24.4 versions before 24.4R2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:Y/R:U/RE:L
CVSS Score: 6.9

Product Status

Vendor Juniper Networks
Product Junos OS
Versions Default: unaffected
  • affected from 0 to 23.2R2-S6 (excl.)
  • affected from 23.4 to 23.4R2-S7 (excl.)
  • affected from 24.2 to 24.2R2 (excl.)
  • affected from 24.4 to 24.4R2 (excl.)

Exploits

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

Workarounds

Renaming the lo0 logical unit used in the default routing instance from non-0 to 0 resolves this issue.

Solutions

The following software releases have been updated to resolve this specific issue: 23.2R2-S6, 23.4R2-S7, 24.2R2, 24.4R2, 25.2R1, and all subsequent releases.

References

Problem Types

  • CWE-754 Improper Check for Unusual or Exceptional Conditions CWE