CVE-2026-33779
Received Received - Intake
Improper Certificate Validation in Junos OS SRX Enables MITM Attack

Publication date: 2026-04-09

Last updated on: 2026-04-17

Assigner: Juniper Networks, Inc.

Description
An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it. When an SRX device is provisioned to connect to Security Director (SD) cloud, it doesn't perform sufficient verification of the received server certificate. This allows a PITM to intercept the communication between the SRX and SD cloud and access credentials and other sensitive information. This issue affects Junos OS: * all versions before 22.4R3-S9, * 23.2 versions before 23.2R2-S6, * 23.4 versions before 23.4R2-S7, * 24.2 versions before 24.2R2-S3, * 24.4 versions before 24.4R2-S2, * 25.2 versions before 25.2R1-S2, 25.2R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-17
Generated
2026-05-06
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 55 associated CPEs
Vendor Product Version / Range
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 22.4
juniper junos 23.2
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 23.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.4
juniper junos 23.2
juniper junos 24.2
juniper junos 24.2
juniper junos 23.4
juniper junos 22.4
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 24.2
juniper junos 24.2
juniper junos to 22.4 (exc)
juniper junos 22.4
juniper junos 22.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 24.2
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.2
juniper junos 24.4
juniper junos 23.4
juniper junos 24.2
juniper junos 24.4
juniper junos 25.2
juniper junos 25.2
juniper junos 25.2
juniper junos 25.2
juniper junos 23.2
juniper junos 23.4
juniper junos 22.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-296 The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Following of a Certificate's Chain of Trust in the J-Web interface of Juniper Networks Junos OS on SRX Series devices.

When an SRX device is set up to connect to the Security Director (SD) cloud, it does not properly verify the server certificate it receives.

Because of this insufficient verification, a person-in-the-middle (PITM) attacker can intercept the communication between the SRX device and the SD cloud.

This interception allows the attacker to access confidential information such as credentials and potentially modify that information.


How can this vulnerability impact me? :

This vulnerability can allow an attacker positioned between your SRX device and the Security Director cloud to intercept sensitive communications.

The attacker could gain access to confidential information, including credentials, which could lead to unauthorized access.

Additionally, the attacker might modify the intercepted information, potentially causing further security issues or disruptions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows a person-in-the-middle (PITM) attacker to intercept communications between the Juniper SRX device and the Security Director cloud, potentially accessing confidential information and credentials.

Such unauthorized access and potential modification of sensitive data could lead to non-compliance with data protection regulations and standards such as GDPR and HIPAA, which require the protection of personal and sensitive information against unauthorized access and breaches.

Therefore, exploitation of this vulnerability may result in violations of confidentiality and integrity requirements mandated by these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart