CVE-2026-33778
Improper Input Validation in Junos IPsec Causes DoS
Publication date: 2026-04-09
Last updated on: 2026-04-17
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.2 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | to 22.4 (exc) |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 22.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1286 | The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Validation of Syntactic Correctness of Input in the IPsec library used by the kmd and iked processes of Juniper Networks Junos OS on SRX Series and MX Series devices.
An unauthenticated attacker on the network can send a specially malformed first ISAKMP packet to the affected device, causing the kmd or iked process to crash and restart.
This crash momentarily prevents new security associations (SAs) from being established, and repeated exploitation can lead to a complete denial of service by preventing any new VPN connections from being created.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a Denial-of-Service (DoS) condition on affected Junos OS devices.
An attacker can cause the kmd/iked processes to crash repeatedly, which disrupts the establishment of new VPN connections.
This means that legitimate users or systems will be unable to establish new secure VPN tunnels, potentially interrupting secure communications and network operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade affected Junos OS devices on SRX Series and MX Series to a fixed version. The affected versions are all versions before 22.4R3-S9, 23.2 versions before 23.2R2-S6, 23.4 versions before 23.4R2-S7, 24.2 versions before 24.2R2-S4, 24.4 versions before 24.4R2-S3, and 25.2 versions before 25.2R1-S2 and 25.2R2.
Applying these updates will prevent the kmd/iked process from crashing due to malformed ISAKMP packets, thereby avoiding Denial-of-Service conditions caused by this vulnerability.