The following security advisory has been announced by Juniper:
2023-04 Security Bulletin: Junos OS and Junos OS Evolved: If malformed IPv6 router advertisements are received, memory corruption will occur which causes an rpd crash (CVE-2023-28981)
https://supportportal.juniper.net/s/article/2023-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-If-malformed-IPv6-router-advertisements-are-received-memory-corruption-will-occur-which-causes-an-rpd-crash-CVE-2023-28981?language=en_US
Our L3 switches and CR routers are potentially affected. The good news is only on our internal-interfaces towards our own servers, as only they have router-advertisements enabled. Still we may want to consider adding the mitigation Juniper suggest:
set firewall family inet6 filter test term 1 from next-header icmp6 set firewall family inet6 filter test term 1 from icmp-type 134 set firewall family inet6 filter test term 1 then discard set firewall family inet6 filter test term 2 then accept
I'm not sure the risk is high enough to warrant a full upgrade cycle on the CRs.