Improper Check Vulnerability in Juniper Networks Junos OS Chassis Control Daemon
CVE-2026-33787

6.8MEDIUM

Key Information:

Status
Vendor
CVE Published:
9 April 2026

Badges

👾 Exploit Exists

What is CVE-2026-33787?

A vulnerability in the chassis control daemon (chassisd) of Juniper Networks' Junos OS affects several SRX series devices by allowing a local attacker with limited privileges to trigger a Denial of Service (DoS). When executing a specific 'show chassis' command via the command-line interface, the chassisd process may crash, leading to temporary disruption of network traffic until the system stabilizes and all modules are operational again. This vulnerability emphasizes the importance of proper security measures to mitigate risks associated with local attacks.

Affected Version(s)

Junos OS SRX1500 0 < 23.2R2-S6

Junos OS SRX1500 23.4 < 23.4R2-S7

Junos OS SRX1500 24.2 < 24.2R2-S2

References

CVSS V4

Score:
6.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.