CVE-2026-33783 PUBLISHED

Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftmand crashes

Assigner: juniper
Reserved: 23.03.2026 Published: 09.04.2026 Updated: 09.04.2026

A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS).

If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system has to be manually restarted to recover. The issue is seen only when the Originator ASN field in PCEP contains a value larger than 65,535 (32-bit ASN). The issue is not reproducible when SRTE policy tunnels are statically configured.

This issue affects Junos OS Evolved on PTX Series: 

  • all versions before 22.4R3-S9-EVO,
  • 23.2 versions before 23.2R2-S6-EVO,
  • 23.4 versions before 23.4R2-S7-EVO,
  • 24.2 versions before 24.2R2-S4-EVO,
  • 24.4 versions before 24.4R2-S2-EVO,
  • 25.2 versions before 25.2R1-S2-EVO, 25.2R2-EVO.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:U/RE:M
CVSS Score: 7.1

Product Status

Vendor Juniper Networks
Product Junos OS Evolved
Versions Default: unaffected
  • affected from 0 to 22.4R3-S9-EVO (excl.)
  • affected from 23.2 to 23.2R2-S6-EVO (excl.)
  • affected from 23.4 to 23.4R2-S7-EVO (excl.)
  • affected from 24.2 to 24.2R2-S4-EVO (excl.)
  • affected from 24.4 to 24.4R2-S2-EVO (excl.)
  • affected from 25.2 to 25.2R1-S2-EVO, 25.2R2-EVO (excl.)

Affected Configurations

To be exposed to this issue a device needs to be configured with SR specific telemetry statistics:

[ protocols source-packet-routing telemetry statistics per-source per-segment-list ]

Exploits

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

Workarounds

Configure the Originator ASN with a value of less than 65,535 (16-bit ASN).

Solutions

The following software releases have been updated to resolve this specific issue: 22.4R3-S9-EVO, 23.2R2-S6-EVO, 23.4R2-S7-EVO, 24.2R2-S4-EVO, 24.4R2-S2-EVO, 25.2R1-S2-EVO, 25.2R2-EVO, 25.4R1-EVO, and all subsequent releases.

References

Problem Types

  • CWE-686 Function Call With Incorrect Argument Type CWE