SB20260408178 - Function call with incorrect argument type in Junos OS Evolved



SB20260408178 - Function call with incorrect argument type in Junos OS Evolved

Published: April 8, 2026

Security Bulletin ID SB20260408178
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Function call with incorrect argument type (CVE-ID: CVE-2026-33783)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to function call with incorrect argument type error in the sensor interface. A remote user can cause a complete Denial of Service (DoS).

If colored SRTE policy tunnels are provisioned via PCEP, and gRPC is used to monitor traffic in these tunnels, evo-aftmand crashes and doesn't restart which leads to a complete and persistent service impact.

The system has to be manually restarted to recover.


Remediation

Install update from vendor's website.