CVE-2026-33779
Severity
8.3HIGH
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateApr 10
Description
An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it.
When an SRX device is provisioned to connect to Security Director (SD) cloud, it doesn't perform sufficient verification of the received server certificate. This allows a PITM to intercept the communication between the SRX and SD cloud and access c…
CVSS vector
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Packages1 packages
🔴Vulnerability Details
3GHSA▶
GHSA-9hcr-jp7m-44jv: An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept t↗2026-04-10
VulDB▶
Juniper Junos OS up to 25.2R1-S2 on SRX Server Certificate Parser improper following of a certificate's chain of trust (JSA107823)↗2026-04-10
CVEList▶
Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communication↗2026-04-09