CVE-2026-33779 PUBLISHED

Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communication

Assigner: juniper
Reserved: 23.03.2026 Published: 09.04.2026 Updated: 09.04.2026

An Improper Following of a Certificate's Chain of Trust vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows a PITM to intercept the communication of the device and get access to confidential information and potentially modify it.

When an SRX device is provisioned to connect to Security Director (SD) cloud, it doesn't perform sufficient verification of the received server certificate. This allows a PITM to intercept the communication between the SRX and SD cloud and access credentials and other sensitive information.

This issue affects Junos OS: * all versions before 22.4R3-S9, * 23.2 versions before 23.2R2-S6, * 23.4 versions before 23.4R2-S7, * 24.2 versions before 24.2R2-S3, * 24.4 versions before 24.4R2-S2, * 25.2 versions before 25.2R1-S2, 25.2R2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/RE:M
CVSS Score: 8.3

Product Status

Vendor Juniper Networks
Product Junos OS
Versions Default: unaffected
  • affected from 0 to 22.4R3-S9 (excl.)
  • affected from 23.2 to 23.2R2-S6 (excl.)
  • affected from 23.4 to 23.4R2-S7 (excl.)
  • affected from 24.2 to 24.2R2-S3 (excl.)
  • affected from 24.4 to 24.4R2-S2 (excl.)
  • affected from 25.2 to 25.2R1-S2, 25.2R2 (excl.)

Exploits

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

Workarounds

There are no known workarounds for this issue.

Solutions

The following software releases have been updated to resolve this specific issue: 22.4R3-S9, 23.2R2-S6, 23.4R2-S7, 24.2R2-S3, 24.4R2-S2, 25.2R1-S2, 25.2R2, 25.4R1, and all subsequent releases.

Credits

  • Juniper SIRT would like to acknowledge and thank Konrad Porzezynski for responsibly reporting this vulnerability. finder

References

Problem Types

  • CWE-296 Improper Following of a Certificate's Chain of Trust CWE