CVE-2026-33779
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
09/04/2026
Last modified:
09/04/2026
Description
An Improper Following of a Certificate&#39;s Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it.<br />
<br />
When an SRX device is provisioned to connect to Security Director (SD) cloud, it doesn&#39;t perform sufficient verification of the received server certificate. This allows a PITM to intercept the communication between the SRX and SD cloud and access credentials and other sensitive information.<br />
<br />
This issue affects Junos OS:<br />
* all versions before 22.4R3-S9,<br />
* 23.2 versions before 23.2R2-S6,<br />
* 23.4 versions before 23.4R2-S7,<br />
* 24.2 versions before 24.2R2-S3,<br />
* 24.4 versions before 24.4R2-S2,<br />
* 25.2 versions before 25.2R1-S2, 25.2R2.
Impact
Base Score 4.0
8.30
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM



