CVE-2026-33790
Improper Condition Check in Junos SRX Causes DoS via ICMPv
Publication date: 2026-04-09
Last updated on: 2026-04-17
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos | 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.3 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 21.2 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2 |
| juniper | junos | 21.4 |
| juniper | junos | 22.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.4 |
| juniper | junos | 22.4 |
| juniper | junos | to 21.2 (exc) |
| juniper | junos | 21.4 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 21.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.4 |
| juniper | junos | 23.2 |
| juniper | junos | 21.2 |
| juniper | junos | 22.4 |
| juniper | junos | 21.4 |
| juniper | junos | 22.2 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.2 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 21.2 |
| juniper | junos | 22.2 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.2 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | 23.4 |
| juniper | junos | 21.2 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 21.2 |
| juniper | junos | 22.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 22.1 |
| juniper | junos | 22.2 |
| juniper | junos | 24.4 |
| juniper | junos | 22.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-754 | The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Check for Unusual or Exceptional Conditions in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series devices.
An attacker can send a specific, malformed ICMPv6 packet that causes the srxpfe process to crash and restart repeatedly.
This repeated crashing leads to a sustained Denial of Service (DoS) condition on the affected device.
The issue specifically occurs during NAT64 translation when the malformed ICMPv6 packet is destined to the device.
This vulnerability cannot be triggered using IPv4 or other types of IPv6 traffic.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a Denial of Service (DoS) condition on Juniper SRX Series devices running affected versions of Junos OS.
An attacker can cause the srxpfe process to crash repeatedly by sending malformed ICMPv6 packets, which can disrupt normal device operation.
This disruption can lead to network outages or degraded network performance, affecting availability of services relying on the device.