<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Juniper — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/juniper/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 22:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/juniper/feed.xml" rel="self" type="application/rss+xml"/><item><title>Juniper Junos OS and Junos OS Evolved BGP Session Reset Denial of Service (CVE-2026-33797)</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-juniper-bgp-dos/</link><pubDate>Thu, 09 Apr 2026 22:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-juniper-bgp-dos/</guid><description>CVE-2026-33797 is an improper input validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved that allows an unauthenticated adjacent attacker to reset established BGP sessions via a specific BGP packet, leading to a denial of service condition.</description><content:encoded><![CDATA[<p>CVE-2026-33797 is a vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved versions 25.2 before 25.2R2 and 25.2-EVO before 25.2R2-EVO, respectively. It stems from improper input validation within the Border Gateway Protocol (BGP) handling. An unauthenticated, adjacent attacker can exploit this flaw by sending a crafted BGP packet to an already established BGP session. This malicious packet causes the targeted BGP session to reset, leading to a Denial of Service (DoS). Repeated transmission of the crafted packet can sustain the DoS condition. Both external BGP (eBGP) and internal BGP (iBGP) sessions are susceptible, and the vulnerability impacts both IPv4 and IPv6 network configurations. This vulnerability poses a risk to network stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Juniper device running Junos OS or Junos OS Evolved versions 25.2 prior to 25.2R2 or 25.2-EVO prior to 25.2R2-EVO.</li>
<li>The attacker establishes network adjacency to the targeted device, allowing for direct BGP communication.</li>
<li>The attacker crafts a specific, but genuine, BGP packet designed to exploit the improper input validation vulnerability.</li>
<li>The attacker sends the crafted BGP packet to an already established BGP session on the target device.</li>
<li>Upon receiving the malicious packet, the vulnerable Junos OS or Junos OS Evolved instance improperly processes it.</li>
<li>Due to the input validation failure, the targeted BGP session is forcibly reset.</li>
<li>The attacker repeats the process of sending the crafted BGP packet to continuously reset the BGP session.</li>
<li>The repeated session resets cause a sustained Denial of Service (DoS), disrupting network routing and connectivity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33797 leads to a denial-of-service condition affecting BGP routing. By repeatedly sending crafted BGP packets, an attacker can disrupt network connectivity and stability. The impact is a loss of routing functionality for networks relying on the targeted BGP sessions. The number of potential victims is broad, including any organization using vulnerable versions of Junos OS or Junos OS Evolved. This can result in service outages, impaired communication, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Junos OS to version 25.2R2 or later to remediate CVE-2026-33797 (see references).</li>
<li>Upgrade Junos OS Evolved to version 25.2R2-EVO or later to remediate CVE-2026-33797 (see references).</li>
<li>Deploy the Sigma rule provided to detect unusual BGP reset activity in network traffic (see rules).</li>
<li>Monitor network traffic for unexpected BGP session resets originating from adjacent networks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-33797</category><category>denial-of-service</category><category>juniper</category><category>bgp</category><category>network</category></item><item><title>Juniper Junos OS MX Series Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-junos-mx-privesc/</link><pubDate>Thu, 09 Apr 2026 22:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-junos-mx-privesc/</guid><description>CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.</description><content:encoded><![CDATA[<p>Juniper Networks Junos OS on MX Series is vulnerable to a missing authorization issue (CVE-2026-33785). This vulnerability allows a local, authenticated user with low privileges to execute specific CLI operational commands, specifically &lsquo;request csds&rsquo;, that should only be available to high-privileged users or those designated for Juniper Device Manager (JDM) / Connected Security Distributed Services (CSDS) operations. Successful exploitation leads to a complete compromise of managed devices. This issue affects Junos OS on MX Series versions 24.4 prior to 24.4R2-S3 and 25.2 prior to 25.2R2. Releases prior to 24.4 are not affected. The vulnerability was published on 2026-04-09.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local, low-privilege access to a Junos OS MX Series device.</li>
<li>Attacker authenticates to the Junos OS CLI using their credentials.</li>
<li>Attacker executes the &lsquo;request csds&rsquo; operational command.</li>
<li>The system fails to perform adequate authorization checks before executing the command.</li>
<li>The &lsquo;request csds&rsquo; command executes with elevated privileges due to the missing authorization.</li>
<li>Attacker leverages the elevated privileges to modify system configurations.</li>
<li>Attacker installs malicious software or backdoors.</li>
<li>Attacker achieves complete compromise of the Junos OS MX Series device, potentially impacting all devices managed by it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33785 allows an attacker to completely compromise a Juniper Junos OS MX Series device. This can lead to unauthorized access to sensitive data, disruption of network services, and the potential compromise of other devices managed by the affected MX Series device. The vulnerability affects Junos OS on MX Series versions 24.4 before 24.4R2-S3 and 25.2 before 25.2R2. While the exact number of vulnerable devices is unknown, the impact is critical due to the potential for widespread network compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Junos OS on MX Series devices to versions 24.4R2-S3 or later, or 25.2R2 or later, to patch CVE-2026-33785.</li>
<li>Implement the provided Sigma rule to detect unauthorized execution of the <code>request csds</code> command.</li>
<li>Monitor Junos OS CLI command logs for suspicious activity, specifically focusing on the <code>request csds</code> command and user privilege levels.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>network</category><category>juniper</category></item></channel></rss>