CVE-2026-33779

CWE-2964 documents4 sources
Severity
8.3HIGH
EPSS
0.0%
top 95.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 9
Latest updateApr 10

Description

An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it. When an SRX device is provisioned to connect to Security Director (SD) cloud, it doesn't perform sufficient verification of the received server certificate. This allows a PITM to intercept the communication between the SRX and SD cloud and access c

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages1 packages

CVEListV5juniper_networks/junos_os23.223.2R2-S6+5

🔴Vulnerability Details

3
GHSA
GHSA-9hcr-jp7m-44jv: An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept t2026-04-10
VulDB
Juniper Junos OS up to 25.2R1-S2 on SRX Server Certificate Parser improper following of a certificate's chain of trust (JSA107823)2026-04-10
CVEList
Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communication2026-04-09
CVE-2026-33779 (HIGH CVSS 8.3) | An Improper Following of a Certific | cvebase.io