6.3
CVE-2026-33785 - Junos OS: MX Series: Missing Authorization for specific 'request' CLI commands in a JDM/CSDS scenar…
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated user with low privileges to execute specific commands which will lead to a complete compromise of managed devices. Any user logged in, without requiring specific privileges, can…
9.3
CVE-2026-33784 - JSI Virtual Lightweight Collector: Default password is not required to be changed which allows unau…
A Use of Default Password vulnerability in the Juniper Networks Support Insights (JSI) Virtual Lightweight Collector (vLWC) allows an unauthenticated, network-based attacker to take full control of the device. vLWC software images ship with an initial password for a high privileged account. A …
7.1
CVE-2026-33783 - Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC qu…
A Function Call With Incorrect Argument Type vulnerability in the sensor interface of Juniper Networks Junos OS Evolved on PTX Series allows a network-based, authenticated attacker with low privileges to cause a complete Denial of Service (DoS). If colored SRTE policy tunnels are provisioned via …
7.1
CVE-2026-33781 - Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are rec…
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS). On EX4k, and QFX5k platforms confi…
8.7
CVE-2026-33778 - Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is received kmd/…
An Improper Validation of Syntactic Correctness of Input vulnerability in the IPsec library used by kmd and iked of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated, network-based attacker to cause a complete Denial-of-Service (DoS). If an affected device receives a…
6.8
CVE-2026-33776 - Junos OS and Junos OS Evolved: Specific low privileged CLI command exposes sensitive information
A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a local user with low privileges to read sensitive information. A local user with low privileges can execute the CLI command 'show mgd' with specific arguments which will expose sensitive info…
6.9
CVE-2026-33774 - Junos OS: MX Series: Firewall filters on lo0.<non-0> in the default routing instance are not in eff…
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to bypass the configured firewall filter and access the control-plane of the device. On MX platfor…
9.1
CVE-2026-33771 - CTP OS: Configuring password requirements does not work which permits the use of weak passwords
A Weak Password Requirements vulnerability in the password management function of Juniper Networks CTP OS might allow an unauthenticated, network-based attacker to exploit weak passwords of local accounts and potentially take full control of the device. The password management menu enables the adm…
7
CVE-2025-13914 - Apstra: SSH host key validation vulnerability for managed devices
A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Networks Apstra allows a unauthenticated, MITM attacker to impersonate managed devices. Due to insufficient SSH host key validation an attacker can perform a machine-in-the-middle attack on the SSH co…
7.1
CVE-2026-33797 - Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset
An Improper Input Validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker, sending a specific genuine BGP packet in an already established BGP session to reset only that session causing a Denial of Service (DoS). An attacker repeatedl…