CVE-2026-33787
Received Received - Intake
Improper Condition Check in Junos chassisd Causes DoS

Publication date: 2026-04-09

Last updated on: 2026-04-17

Assigner: Juniper Networks, Inc.

Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600 allows a local attacker with low privileges to cause a complete Denial of Service (DoS). When a specific 'show chassis' CLI command is executed, chassisd crashes and restarts which causes a momentary impact to all traffic until all modules are online again. This issue affects Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600:Β  * 23.2 versions beforeΒ 23.2R2-S6, * 23.4 versions beforeΒ 23.4R2-S7 * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2, * 25.2 versions before 25.2R1-S1, 25.2R2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-17
Generated
2026-05-06
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 34 associated CPEs
Vendor Product Version / Range
juniper junos 23.2
juniper junos 23.2
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 23.2
juniper junos 24.2
juniper junos 24.2
juniper junos 23.4
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 23.4
juniper junos 24.2
juniper junos 24.2
juniper junos 23.2
juniper junos 23.2
juniper junos 23.4
juniper junos 24.2
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.4
juniper junos 24.2
juniper junos 23.4
juniper junos 25.2
juniper junos 25.2
juniper junos 25.2
juniper junos 23.2
juniper junos 23.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-754 The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Check for Unusual or Exceptional Conditions in the chassis control daemon (chassisd) of Juniper Networks Junos OS on certain SRX series devices.

A local attacker with low privileges can trigger this vulnerability by executing a specific 'show chassis' CLI command, which causes the chassisd process to crash and restart.

The crash and restart of chassisd cause a momentary disruption to all traffic until all modules come back online.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a complete Denial of Service (DoS) on affected Juniper SRX devices.

When exploited, the chassis control daemon crashes and restarts, causing a temporary interruption of all network traffic handled by the device.

This momentary outage can affect network availability and potentially disrupt business operations relying on continuous network connectivity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart