Juniper SRX Series CVE-2026-33790: NAT64 ICMPv6 Denial of Service via srxpfe Crash

A brief summary of CVE-2026-33790, a high severity denial of service vulnerability in Juniper SRX Series firewalls triggered by malformed ICMPv6 packets during NAT64 translation. Includes patch details, affected versions, and detection strategies.

CVE Analysis

8 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-09

Juniper SRX Series CVE-2026-33790: NAT64 ICMPv6 Denial of Service via srxpfe Crash
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A malformed ICMPv6 packet sent to a Juniper SRX Series firewall performing NAT64 translation can crash the packet forwarding engine, and an attacker who keeps sending that packet can hold the device in a sustained outage. CVE-2026-33790 carries a CVSS v3.1 score of 7.5 and a CVSS v4.0 score of 8.7, reflecting the fact that this is a remotely exploitable, unauthenticated denial of service condition affecting a widely deployed class of network security appliance.

Juniper's SRX Series firewalls are a staple of enterprise and service provider networks, serving as perimeter security devices in data centers, campus environments, and large branch offices. With Juniper Networks now part of HPE, the SRX platform's installed base is substantial. Any vulnerability that can take an SRX offline with a single packet warrants close attention from network and security operations teams.

Technical Information

Root Cause

CVE-2026-33790 is classified under CWE-754: Improper Check for Unusual or Exceptional Conditions. The vulnerability resides in the flow daemon (flowd) of Junos OS, specifically in how the srxpfe process (the SRX Packet Forwarding Engine) handles ICMPv6 packets during NAT64 translation. When a specific malformed ICMPv6 packet destined to the device itself arrives and enters the NAT64 translation path, the srxpfe process encounters an unhandled exceptional condition and crashes.

The core issue is a missing validation step. The code path responsible for processing ICMPv6 packets within the NAT64 translation flow does not perform adequate bounds checking or input validation on certain malformed packet structures. When the malformed packet reaches this unprotected code path, it triggers a fatal error in srxpfe, causing the process to crash and restart.

CVSS Metrics

Metric CategoryCVSS v3.1CVSS v4.0
Base Score7.5 HIGH8.7 HIGH
Vector StringAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HAV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/V:C/RE:M/U:Amber
Attack VectorNetworkNetwork
Attack ComplexityLowLow
Privileges RequiredNoneNone
User InteractionNoneNone
Availability ImpactHighHigh

Exploit Preconditions

The scope of this vulnerability is narrow but carries a high impact for exposed configurations:

  1. The target must be a Juniper SRX Series device running a vulnerable version of Junos OS.
  2. The device must have an active NAT64 (IPv6 to IPv4 translation) configuration.
  3. The attacker must be able to route a malformed ICMPv6 packet to the device.

Environments not actively performing NAT64 translation on their SRX devices are not exposed to this attack vector, regardless of Junos OS version. The issue also cannot be triggered using IPv4 traffic or other standard IPv6 traffic.

Attack Flow

Based on the advisory details, the exploitation sequence proceeds as follows:

  1. The attacker identifies a target SRX Series device with NAT64 enabled and IPv6 reachability.
  2. The attacker crafts a specific malformed ICMPv6 packet and sends it to the device. The packet must be destined to the device itself (not simply transiting it) and must enter the NAT64 translation path.
  3. When flowd processes this packet through the NAT64 translation logic, the srxpfe process encounters the unhandled condition and crashes.
  4. The srxpfe process restarts automatically, but the attacker can immediately send another malformed packet.
  5. By continuously sending these packets, the attacker forces srxpfe into a repeated crash loop, sustaining the Denial of Service condition and disrupting all traffic processing on the device.

The attack requires no authentication, no user interaction, and low complexity. The only requirement is network reachability to the target device over IPv6.

Patch Information

Juniper Networks published security advisory JSA107874 on April 8, 2026, delivering official firmware level patches across multiple supported Junos OS release trains for the SRX Series. The fix adds proper validation and bounds checking for malformed ICMPv6 packets before they reach the crash inducing code path. After patching, the srxpfe process will gracefully reject malformed ICMPv6 packets rather than crashing and restarting.

The following Junos OS releases contain the fix:

Release TrainFixed Version
21.221.2R3-S10
21.421.4R3-S12
22.422.4R3-S9
23.223.2R2-S6
23.423.4R2-S7
24.224.2R2-S3
24.424.4R2-S3
25.225.2R1-S2 or 25.2R2
25.425.4R1 (and all subsequent releases)

End of Life branches with no fix available: The 21.3 and 22.1 release branches have no patch available. All versions within those trains remain vulnerable because those branches have reached Juniper's End of Engineering (EOE) or End of Life (EOL) status, and Juniper's SIRT policy does not backport fixes to them. Organizations still running 21.3 or 22.1 on SRX Series devices must upgrade to a supported train with the fix applied.

The 22.2 branch implies a fix boundary at 22.2R3-S8 (since the advisory states versions "from 22.2 before 22.2R3-S8" are affected), though this version is notably absent from the official Solution list, suggesting 22.2 may also be near or at EOL.

Juniper is tracking this fix internally under bug PR1897060. The advisory confirms there are no workarounds for this vulnerability, making upgrading to a patched firmware the only remediation path. Only SRX Series devices configured with NAT64 are affected, so the fix is specifically relevant to environments with that configuration active.

Detection Methods

Detecting CVE-2026-33790 requires a layered approach combining proactive vulnerability scanning with behavioral monitoring on Juniper SRX Series devices.

Vulnerability Scanning with Nessus

Tenable has published a dedicated Nessus plugin, Plugin ID 305588 (file: juniper_jsa107874.nasl), under the "Junos Local Security Checks" family, released on April 8, 2026. This plugin performs a version based check against the device's self reported Junos OS version, using the Host/Juniper/model and Host/Juniper/JUNOS/Version knowledge base items collected during credentialed scans. It does not attempt to exploit the vulnerability; it simply compares the running Junos OS version against the list of known affected releases to flag at risk devices. Organizations running Nessus or Tenable products should ensure this plugin is included in their scan policies targeting SRX infrastructure.

Version Based Identification

Even without automated scanning, defenders can manually audit their SRX fleet for exposure. The Juniper advisory (JSA107874) provides a precise enumeration of affected Junos OS versions. Any SRX device running a version within the affected ranges warrants immediate investigation. The show version command on Junos OS will display the current release.

Configuration Exposure Check

A critical prerequisite for this vulnerability is the presence of a NAT64 configuration on the SRX device. The Juniper advisory explicitly notes this by providing example configuration stanzas, such as NAT source pools with IPv4 addresses, rule sets matching IPv6 source addresses with a 0.0.0.0/0 destination, and static NAT rule sets using static-nat inet under a destination IPv6 /96 prefix. Defenders should audit their SRX configurations and identify all devices with active NAT64 rule sets, as these are the only ones exposed to this attack vector. Devices without NAT64 configurations are not vulnerable regardless of their Junos OS version.

Behavioral Monitoring for Active Exploitation

Since this vulnerability causes the srxpfe process to crash and restart when a malformed ICMPv6 packet is received during NAT64 translation, repeated or unexpected srxpfe process crashes are a key behavioral indicator that exploitation may be underway. Security operations teams should monitor device logs and SNMP traps for signs of recurring srxpfe restarts on SRX devices with NAT64 enabled. A pattern of repeated crashes, particularly coinciding with elevated ICMPv6 traffic, should be treated as a strong indicator of attack attempts and investigated promptly.

Gaps in Detection Coverage

As of the time of writing, no IDS/IPS signatures (such as Snort or Suricata rules), YARA rules, or Sigma detection rules have been published specifically for CVE-2026-33790. There are also no known traditional Indicators of Compromise such as file hashes or malicious IP addresses, which is consistent with this being a network based DoS vulnerability rather than a malware related threat. Detection therefore relies primarily on version auditing, configuration review, and process crash monitoring rather than signature based network detection.

Affected Systems and Versions

The vulnerability affects Juniper Networks Junos OS exclusively on the SRX Series platform. The following version ranges are affected:

Junos OS TrainAffected VersionsFix Status
21.2All versions before 21.2R3-S10Fixed in 21.2R3-S10
21.3All versions (entire train)No fix available; EOE/EOL
21.4From 21.4 before 21.4R3-S12Fixed in 21.4R3-S12
22.1All versions (entire train)No fix available; EOE/EOL
22.2From 22.2 before 22.2R3-S8Fix boundary at 22.2R3-S8 (possibly near EOL)
22.4All versions before 22.4R3-S9Fixed in 22.4R3-S9
23.2From 23.2 before 23.2R2-S6Fixed in 23.2R2-S6
23.4From 23.4 before 23.4R2-S7Fixed in 23.4R2-S7
24.2From 24.2 before 24.2R2-S3Fixed in 24.2R2-S3
24.4From 24.4 before 24.4R2-S3Fixed in 24.4R2-S3
25.2From 25.2 before 25.2R1-S2 or 25.2R2Fixed in 25.2R1-S2 or 25.2R2

Required configuration: Only SRX Series devices with an active NAT64 (IPv6 to IPv4 translation) configuration are vulnerable. Devices without NAT64 configured are not affected regardless of their Junos OS version.

Vendor Security History

The SRX Series platform has a notable history of being targeted by threat actors. In 2023, multiple Juniper SRX vulnerabilities were listed among the top routinely exploited vulnerabilities by malicious cyber actors, as documented in a joint advisory published by CISA and partner agencies (advisory AA24-317A). Specifically, flaws such as CVE-2023-36844 affecting Junos OS on SRX Series were heavily targeted in the wild. This historical pattern of rapid weaponization of Juniper edge device vulnerabilities provides important context for CVE-2026-33790. Attackers have demonstrated both the capability and the intent to exploit SRX vulnerabilities quickly after disclosure, which argues for treating this advisory with urgency even in the absence of confirmed exploitation today.

References

Detect & fix
what others miss

Security magnifying glass visualization