Vulnerabilities

Juniper Networks Releases Patches for Nearly 30 Junos OS Security Flaws

April 10, 2026 17:11 · 4 min read
Juniper Networks Releases Patches for Nearly 30 Junos OS Security Flaws

Overview of the Patch Release

Juniper Networks has published security updates addressing nearly three dozen vulnerabilities spanning its Junos OS, Junos OS Evolved, CTP OS, and Apstra platforms. The flaws range in impact from medium severity to a critical 9.8 CVSS score, and the potential consequences include privilege escalation, denial-of-service (DoS) conditions, and remote command execution. The company stated it has no evidence that any of these vulnerabilities have been actively exploited in the wild.

Critical Flaw: Default Password in JSI vLWC (CVE-2026-33784)

The most serious vulnerability in this batch is CVE-2026-33784, which carries a CVSS score of 9.8. The flaw resides in the Support Insights (JSI) Virtual Lightweight Collector (vLWC) component and stems from a default password shipped with the software's initial installation image.

According to Juniper Networks, the vLWC software images are distributed with a pre-set password for a high-privileged account. Crucially, the provisioning process does not enforce a password change, meaning the default credential can remain active indefinitely. As Juniper explains directly:

"vLWC software images ship with an initial password for a high-privileged account. A change of this password is not enforced during the provisioning of the software, which can make full access to the system by unauthorized actors possible."

This makes the flaw remotely exploitable without any authentication, allowing a threat actor to potentially take complete control of a vulnerable device.

Weak Password Vulnerability in CTP OS (CVE-2026-33771)

A second notable issue, tracked as CVE-2026-33771, affects CTP OS. This high-severity weakness arises because password complexity settings are not persistently saved, which leads to the adoption of weak passwords that are susceptible to guessing attacks.

The practical result is that remote, unauthenticated attackers could potentially leverage this flaw to gain full control of a targeted CTP OS device. The root cause — configuration settings for password complexity silently failing to persist — represents a systemic weakness in how the software handles credential enforcement.

SSH Key Validation Bug in Juniper Apstra

Juniper also resolved a high-severity SSH host key validation vulnerability in its Apstra network management platform. The flaw could be exploited through machine-in-the-middle (MITM) attacks, enabling adversaries positioned on the network to intercept and capture user credentials during SSH sessions.

High-Severity Flaws in Junos OS

Several additional high-severity bugs were addressed within Junos OS itself. These vulnerabilities could allow attackers to:

The diversity of these attack vectors reflects the breadth of the attack surface present in complex network operating systems like Junos OS, particularly in large enterprise and service provider environments where these devices are commonly deployed.

Medium-Severity Vulnerabilities

The remaining vulnerabilities patched in this release are classified as medium severity. Despite their lower CVSS scores, these bugs still carry meaningful risk. According to Juniper, exploitation of these flaws could enable attackers to:

No Active Exploitation Reported

Juniper Networks confirmed that, as of the time of disclosure, it is not aware of any in-the-wild exploitation of these vulnerabilities. Nonetheless, organizations running affected versions of Junos OS, Junos OS Evolved, CTP OS, or Apstra are strongly encouraged to apply the available patches promptly. Default and weak credential vulnerabilities, in particular, are historically attractive targets once publicly disclosed.

Full technical details and patch guidance are available through Juniper Networks' official support portal.


Source: SecurityWeek

Source: SecurityWeek

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free