Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
- Last update: 14/04/2026
- Affected software:
→ Junos OS MX Series
. Juniper Junos 22.4r3-s0; Juniper Junos 23.2r1; Juniper Junos 23.4r1
→ Junos OS Evolved on PTX Series
. Junos Os Evolved 23.0; Junos Os Evolved 23.1; Junos Os Evolved 23.2; Junos Os Evolved 23.3; Junos Os Evolved 24.0; Junos Os Evolved 24.1; Junos Os Evolved 24.2; Junos Os Evolved 24.3; Junos Os Evolved 25.0; Junos Os Evolved 25.1- Type:
→ Missing Release of Memory after Effective Lifetime
→ Function Call with Incorrect Argument Type- CVE/CVSS
→ CVE-2026-33782: 8.7 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/)
→ CVE-2026-33783: 7.1 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L)
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-33782
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-33783
Two vulnerabilities have been identified in Juniper Junos OS that could allow attackers to trigger a complete Denial of Service (DoS) condition on affected devices.
Successful exploitation of either vulnerability can highly impact the availability of network devices and may disrupt critical services.
CVE-2026-33782 (CVSS 8.7), is a Missing Release of Memory after Effective Lifetime vulnerability in the DHCP daemon (jdhcpd) of Juniper Networks Junos OS on MX Series, that allows an adjacent, unauthenticated attacker to cause a memory leak, that will eventually cause a complete DoS.
In a DHCPv6 over PPPoE, or DHCPv6 over VLAN with Active lease query or Bulk lease query scenario, every subscriber logout will leak a small amount of memory. When all available memory has been exhausted, jdhcpd will crash and restart which causes a complete service impact until the process has recovered.
CVE-2026-33783 (CVSS 7.1), a Function Call with Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series, allows a network-based, authenticated attacker with low privileges to cause a complete DoS.
If SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact. The system must be manually restarted to recover. The issue is seen only when the Originator ASN field in PCEP contains a value larger than 65,535 (32-bit ASN). The issue is not reproducible when SRTE policy tunnels are statically configured.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable instances with the highest priority after thorough testing.
The following software releases have been updated to resolve these issues:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-33782
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-33783
Juniper - https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-In-specific-DHCPv6-scenarios-jdhcpd-memory-increases-continuously-with-subscriber-logouts-CVE-2026-33782
Juniper - https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783