{"api_version":"1","generated_at":"2026-04-21T10:23:02+00:00","cve":"CVE-2026-33773","urls":{"html":"https://cve.report/CVE-2026-33773","api":"https://cve.report/api/cve/CVE-2026-33773.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-33773","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-33773"},"summary":{"title":"Junos OS: EX Series, QFX Series: If the same egress filter is configured on both an IRB and a physical interface one of those is not applied","description":"An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to downstream networks.\n\nWhen the same family inet or inet6 filter is applied on an IRB interface and on a physical interface as egress filter on EX4100, EX4400, EX4650 and QFX5120 devices, only one of the two filters will be applied, which can lead to traffic being sent out one of these interfaces which should have been blocked.\n\nThis issue affects Junos OS on EX Series and QFX Series:\n  *  23.4 version 23.4R2-S6,\n  *  24.2 version 24.2R2-S3.\n\n\nNo other Junos OS versions are affected.","state":"PUBLISHED","assigner":"juniper","published_at":"2026-04-09 22:16:25","updated_at":"2026-04-17 17:56:54"},"problem_types":["NVD-CWE-Other","CWE-1419 CWE-1419 Incorrect Initialization of Resource"],"metrics":[{"version":"4.0","source":"sirt@juniper.net","type":"Secondary","score":"6.9","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X","baseScore":6.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"6.9","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/AU:Y/R:U/RE:M","data":{"Automatable":"YES","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/AU:Y/R:U/RE:M","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"MODERATE"}},{"version":"3.1","source":"sirt@juniper.net","type":"Primary","score":"5.8","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.8","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://kb.juniper.net/JSA107815","name":"https://kb.juniper.net/JSA107815","refsource":"sirt@juniper.net","tags":["Mitigation","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-33773","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33773","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Juniper Networks","product":"Junos OS","version":"affected 23.4R2-S6 23.4R2-S7 semver","platforms":["EX Series","QFX Series"]},{"source":"CNA","vendor":"Juniper Networks","product":"Junos OS","version":"affected 24.2R2-S3 24.2R2-S4 semver","platforms":["EX Series","QFX Series"]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"The following software releases have been updated to resolve this specific issue: 23.4R2-S7, 24.2R2-S4.","time":"","lang":"en"}],"workarounds":[{"source":"CNA","title":"","value":"Two different workarounds are available:\n\n\n\n1. create the same filter but under a different name and apply that to one of the interfaces, so that each interface has a unique copy of the filter in question as shown in the following example:\n\nuser@host# copy ... <filter> to ... <filter2>\nuser@host# set interfaces irb unit <unit2> family inet/inet6 filter output <filter2>\n\n\n\n\n2. configure the filter as \"interface specific\" by adding the keyword to the filter definition:\n\n[ firewall family inet/inet6 filter <filter> interface-specific ]\n \nwhich implicitly creates a copy of the original filter per applied interface.","time":"","lang":"en"}],"exploits":[{"source":"CNA","title":"","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.","time":"","lang":"en"}],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex2300","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex2300-c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex3400","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4000","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4100","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4100-f","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4100-h","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4300","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4400","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4600","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex4650","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex9204","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex9208","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"ex9214","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"juniper","cpe5":"junos","cpe6":"23.4","cpe7":"r2-s6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"juniper","cpe5":"junos","cpe6":"24.2","cpe7":"r2-s3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx10008","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx10016","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5110","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5120","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5130","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5200","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5210","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5220","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5230-64cd","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5240","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5241","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"33773","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"juniper","cpe5":"qfx5700","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"33773","cve":"CVE-2026-33773","epss":"0.000470000","percentile":"0.141410000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:47"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-33773","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-13T17:39:31.771075Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-13T18:06:20.091Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["EX Series","QFX Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"23.4R2-S7","status":"affected","version":"23.4R2-S6","versionType":"semver"},{"lessThan":"24.2R2-S4","status":"affected","version":"24.2R2-S3","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"For a device to be affected the same filter needs to be applied as output to an IRB interface and a non-IRB interface as shown in the following example:<br><br><tt>interfaces &lt;interface1&gt; unit &lt;unit1&gt; family inet/inet6 filter output &lt;filter&gt;<br><br>vlans &lt;vlan_name&gt; vlan-id &lt;vlan#&gt;<br>vlans &lt;vlan_name&gt; l3-interface irb.&lt;unit2&gt;<br>\n\n<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">interfaces &lt;interface2&gt; unit &lt;unit3&gt; family ethernet-switching vlan members &lt;vlan_name&gt;</span><br>\n\ninterfaces irb unit &lt;unit2&gt; family inet/inet6 filter output &lt;filter&gt;</span><br>\n\n</tt><br>"}],"value":"For a device to be affected the same filter needs to be applied as output to an IRB interface and a non-IRB interface as shown in the following example:\n\ninterfaces <interface1> unit <unit1> family inet/inet6 filter output <filter>\n\nvlans <vlan_name> vlan-id <vlan#>\nvlans <vlan_name> l3-interface irb.<unit2>\n\n\n\n\ninterfaces <interface2> unit <unit3> family ethernet-switching vlan members <vlan_name>\n\n\ninterfaces irb unit <unit2> family inet/inet6 filter output <filter>"}],"datePublic":"2026-04-08T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to downstream networks.<br><br>When the same family inet or inet6 filter is applied on an IRB interface and on a physical interface as egress filter on EX4100, EX4400, EX4650 and QFX5120 devices, only one of the two filters will be applied, which can lead to traffic being sent out one of these interfaces which should have been blocked.<br><br>This issue affects Junos OS on EX Series and QFX Series:<br><ul><li>23.4 version 23.4R2-S6,</li><li>24.2 version 24.2R2-S3.</li></ul>No other Junos OS versions are affected.<br><br>"}],"value":"An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to downstream networks.\n\nWhen the same family inet or inet6 filter is applied on an IRB interface and on a physical interface as egress filter on EX4100, EX4400, EX4650 and QFX5120 devices, only one of the two filters will be applied, which can lead to traffic being sent out one of these interfaces which should have been blocked.\n\nThis issue affects Junos OS on EX Series and QFX Series:\n  *  23.4 version 23.4R2-S6,\n  *  24.2 version 24.2R2-S3.\n\n\nNo other Junos OS versions are affected."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"YES","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/AU:Y/R:U/RE:M","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1419","description":"CWE-1419 Incorrect Initialization of Resource","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T21:28:56.625Z","orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper"},"references":[{"tags":["vendor-advisory"],"url":"https://kb.juniper.net/JSA107815"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: 23.4R2-S7, 24.2R2-S4."}],"value":"The following software releases have been updated to resolve this specific issue: 23.4R2-S7, 24.2R2-S4."}],"source":{"advisory":"JSA107815","defect":["1900891"],"discovery":"INTERNAL"},"title":"Junos OS: EX Series, QFX Series: If the same egress filter is configured on both an IRB and a physical interface one of those is not applied","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Two different workarounds are available:<br><br>\n\n1. create the same filter but under a different name and apply that to one of the interfaces, so that each interface has a unique copy of the filter in question as shown in the following example:<br><br><tt>user@host# copy ... &lt;filter&gt; to ... &lt;filter2&gt;<br>user@host# set&nbsp;interfaces irb unit &lt;unit2&gt; family inet/inet6 filter output &lt;filter2&gt;<br><br><br></tt>\n\n2. configure the filter as \"interface specific\" by adding the keyword to the filter definition:<br><tt><br>[ f<span style=\"background-color: rgb(255, 255, 255);\">irewall family inet/inet6 filter &lt;filter&gt; interface-specific&nbsp;</span>]<br></tt> <br>which implicitly creates a copy of the original filter per applied interface."}],"value":"Two different workarounds are available:\n\n\n\n1. create the same filter but under a different name and apply that to one of the interfaces, so that each interface has a unique copy of the filter in question as shown in the following example:\n\nuser@host# copy ... <filter> to ... <filter2>\nuser@host# set interfaces irb unit <unit2> family inet/inet6 filter output <filter2>\n\n\n\n\n2. configure the filter as \"interface specific\" by adding the keyword to the filter definition:\n\n[ firewall family inet/inet6 filter <filter> interface-specific ]\n \nwhich implicitly creates a copy of the original filter per applied interface."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}}},"cveMetadata":{"assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","assignerShortName":"juniper","cveId":"CVE-2026-33773","datePublished":"2026-04-09T21:28:56.625Z","dateReserved":"2026-03-23T19:46:13.668Z","dateUpdated":"2026-04-13T18:06:20.091Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 22:16:25","lastModifiedDate":"2026-04-17 17:56:54","problem_types":["NVD-CWE-Other","CWE-1419 CWE-1419 Incorrect Initialization of Resource"],"metrics":{"cvssMetricV40":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X","baseScore":6.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"sirt@juniper.net","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:23.4:r2-s6:*:*:*:*:*:*","matchCriteriaId":"4D9A36E5-A1BB-46E1-91B6-91A4C40C1B59"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:24.2:r2-s3:*:*:*:*:*:*","matchCriteriaId":"619B5EA0-0369-4AFE-AD8B-A3A22B326F9E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*","matchCriteriaId":"3B3302CB-457F-4BD2-B80B-F70FB4C4542E"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*","matchCriteriaId":"979C3597-C53B-4F4B-9EA7-126DA036C86D"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*","matchCriteriaId":"47DAF5E7-E610-4D74-8573-41C16D642837"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4000:-:*:*:*:*:*:*:*","matchCriteriaId":"152FD759-F5D2-4ACE-ADD6-7FE89B31D961"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:*","matchCriteriaId":"C2521C83-E8F2-4621-9727-75BB3FC11E64"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:*","matchCriteriaId":"6F496D19-D28C-4517-90A3-90EC62BC5D79"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4100-h:-:*:*:*:*:*:*:*","matchCriteriaId":"7DA4A8C7-EBC0-449E-BD37-69FABDC917C2"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*","matchCriteriaId":"E594D6DC-87F6-40D2-8268-ED6021462168"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*","matchCriteriaId":"4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*","matchCriteriaId":"D1BB20B5-EA30-4E8E-9055-2E629648436A"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*","matchCriteriaId":"2B425BB1-3C78-42B1-A6C1-216E514191F0"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*","matchCriteriaId":"86E82CE3-F43D-4B29-A64D-B14ADB6CC357"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*","matchCriteriaId":"13C0199E-B9F0-41D3-B625-083990517CDF"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*","matchCriteriaId":"8790B456-DFC7-4E82-9A0C-C89787139B79"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*","matchCriteriaId":"1453E42A-77B3-4922-8EC3-1A5668C39550"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*","matchCriteriaId":"26408465-BD6A-4416-B98E-691A5F651080"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*","matchCriteriaId":"79A8847B-4F98-4949-8639-5CD2B411D10F"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*","matchCriteriaId":"09EBDE4B-764F-4DF1-844A-BB8A52CD53EF"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:*","matchCriteriaId":"AB58A6E9-FFCF-4331-AC3B-45C37BD1943E"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*","matchCriteriaId":"EDC5478F-A047-4F6D-BB11-0077A74C0174"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*","matchCriteriaId":"D877320D-1997-4B66-B11B-864020C755E1"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*","matchCriteriaId":"D193BEBD-9436-468D-B89E-D5720603451D"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5230-64cd:-:*:*:*:*:*:*:*","matchCriteriaId":"9F3D09BE-C16F-4E77-B6FB-C0C58BBD7675"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5240:-:*:*:*:*:*:*:*","matchCriteriaId":"9ABF8F9D-45C1-4554-A213-435A68709FCB"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5241:-:*:*:*:*:*:*:*","matchCriteriaId":"685120A6-7005-4ECB-A37F-0F225BB92676"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:qfx5700:-:*:*:*:*:*:*:*","matchCriteriaId":"C7D6C74F-E85F-4D62-BDAF-FE619B467C76"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"33773","Ordinal":"1","Title":"Junos OS: EX Series, QFX Series: If the same egress filter is co","CVE":"CVE-2026-33773","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"33773","Ordinal":"1","NoteData":"An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX Series and QFX Series device allows an unauthenticated, network-based attacker to cause an integrity impact to downstream networks.\n\nWhen the same family inet or inet6 filter is applied on an IRB interface and on a physical interface as egress filter on EX4100, EX4400, EX4650 and QFX5120 devices, only one of the two filters will be applied, which can lead to traffic being sent out one of these interfaces which should have been blocked.\n\nThis issue affects Junos OS on EX Series and QFX Series:\n  *  23.4 version 23.4R2-S6,\n  *  24.2 version 24.2R2-S3.\n\n\nNo other Junos OS versions are affected.","Type":"Description","Title":"Junos OS: EX Series, QFX Series: If the same egress filter is co"}]}}}