CVE-2026-33779
Improper Certificate Validation in Junos OS SRX Enables MITM Attack
Publication date: 2026-04-09
Last updated on: 2026-04-17
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.2 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | to 22.4 (exc) |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.4 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 25.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-296 | The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Following of a Certificate's Chain of Trust in the J-Web interface of Juniper Networks Junos OS on SRX Series devices.
When an SRX device is set up to connect to the Security Director (SD) cloud, it does not properly verify the server certificate it receives.
Because of this insufficient verification, a person-in-the-middle (PITM) attacker can intercept the communication between the SRX device and the SD cloud.
This interception allows the attacker to access confidential information such as credentials and potentially modify that information.
How can this vulnerability impact me? :
This vulnerability can allow an attacker positioned between your SRX device and the Security Director cloud to intercept sensitive communications.
The attacker could gain access to confidential information, including credentials, which could lead to unauthorized access.
Additionally, the attacker might modify the intercepted information, potentially causing further security issues or disruptions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows a person-in-the-middle (PITM) attacker to intercept communications between the Juniper SRX device and the Security Director cloud, potentially accessing confidential information and credentials.
Such unauthorized access and potential modification of sensitive data could lead to non-compliance with data protection regulations and standards such as GDPR and HIPAA, which require the protection of personal and sensitive information against unauthorized access and breaches.
Therefore, exploitation of this vulnerability may result in violations of confidentiality and integrity requirements mandated by these regulations.