目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-33780— Juniper Networks Junos OS和Juniper Networks Junos OS Evolved 安全漏洞

CVSS 6.5 · Medium EPSS 0.02% · P5
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-33780 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Junos OS and Junos OS Evolved: In an EVPN-MPLS scenario churn of ESI routes causes a memory leak in l2ald
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A Missing Release of Memory after Effective Lifetime vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a memory leak ultimately leading to a Denial of Service (DoS). In an EVPN-MPLS scenario, routes learned from remote multi-homed Provider Edge (PE) devices are programmed as ESI routes. Due to a logic issue in the l2ald memory management, memory allocated for these routes is not released when there is churn for these routes. As a result, memory leaks in the l2ald process which will ultimately lead to a crash and restart of l2ald. Use the following command to monitor the memory consumption by l2ald: user@device> show system process extensive | match "PID|l2ald" This issue affects: Junos OS: * all versions before 22.4R3-S5, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R2; Junos OS Evolved: * all versions before 22.4R3-S5-EVO, * 23.2 versions before 23.2R2-S3-EVO, * 23.4 versions before 23.4R2-S4-EVO, * 24.2 versions before 24.2R2-EVO.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
在移除最后引用时对内存的释放不恰当(内存泄露)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Juniper Networks Junos OS和Juniper Networks Junos OS Evolved 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Juniper Networks Junos OS和Juniper Networks Junos OS Evolved都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos OS是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。Juniper Networks Junos OS Evolved是Junos OS 的升级版系统。 Juniper Networks Junos OS和Juniper Network
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
Juniper NetworksJunos OS 0 ~ 22.4R3-S5 -
Juniper NetworksJunos OS Evolved all version prior to ~ 22.4R3-S5-EVO -

二、漏洞 CVE-2026-33780 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-33780 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · Juniper Networks · 2026-04-09 · 共 26 条

CVE-2026-337849.8 CRITICALJuniper Networks Support Insights Virtual Lightweight Collector 安全漏洞
CVE-2026-337858.8 HIGHJuniper Networks Junos OS MX 安全漏洞
CVE-2025-139148.7 HIGHJuniper Networks Apstra 安全漏洞
CVE-2026-337937.8 HIGHJuniper Networks Junos OS和Juniper Networks Junos OS Evolved 安全漏洞
CVE-2026-337887.8 HIGHJuniper Networks Junos OS Evolved 访问控制错误漏洞
CVE-2026-337907.5 HIGHJuniper Networks Junos OS SRX 代码问题漏洞
CVE-2026-337787.5 HIGHJuniper Networks Junos OS SRX和Juniper Networks Junos OS MX 安全漏洞
CVE-2026-337717.4 HIGHJuniper Networks CTP OS 安全漏洞
CVE-2026-337977.4 HIGHJuniper Networks Junos OS和Juniper Networks Junos OS Evolved 输入验证错误漏洞
CVE-2026-219167.3 HIGHJuniper Networks Junos OS 安全漏洞
CVE-2026-337916.7 MEDIUMJuniper Networks Junos OS和Juniper Networks Junos OS Evolved 操作系统命令注入漏洞
CVE-2026-219156.7 MEDIUMJuniper Networks Support Insights Virtual Lightweight Collector 安全漏洞
CVE-2026-337746.5 MEDIUMJuniper Networks Junos OS MX 代码问题漏洞
CVE-2026-337836.5 MEDIUMJuniper Networks Junos OS Evolved 安全漏洞
CVE-2026-337796.5 MEDIUMJuniper Networks Junos OS 安全漏洞
CVE-2026-337756.5 MEDIUMJuniper Networks Junos OS 安全漏洞
CVE-2026-337826.5 MEDIUMJuniper Networks Junos OS MX 安全漏洞
CVE-2026-337816.5 MEDIUMJuniper Networks Junos OS EX/QFX 代码问题漏洞
CVE-2025-599696.5 MEDIUMJuniper Networks Junos OS Evolved 安全漏洞
CVE-2026-219196.5 MEDIUMJuniper Networks Junos OS和Juniper Networks Junos OS Evolved 安全漏洞

显示前 20 条,共 26 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-33780

暂无评论


发表评论