Juniper Networks Issues Urgent Security Patch for Multiple Junos OS Vulnerabilities

Juniper-Networks-Issues-Urgent-Security-Patch-for-Multiple-Junos-OS-Vulnerabilities

Patches Released for Nearly Three Dozen Vulnerabilities in Juniper Networks Junos OS

Juniper Networks has released patches for nearly three dozen vulnerabilities in its Junos OS and Junos OS Evolved operating systems.

Most Severe Flaw Carries CVSS Score of 9.8

The most severe flaw, tracked as CVE-2026-33784, allows remote attackers to take control of a vulnerable device due to a default password in the Support Insights (JSI) Virtual Lightweight Collector (vLWC).

According to Juniper Networks, the vulnerability was caused by a failure to enforce a strong password for a high-privileged account used in vLWC software images.This oversight allowed unauthorized actors to potentially access the system without needing to guess the password.Juniper Networks emphasized the need for users to change the default password after deploying the software, citing that failing to do so would leave the system exposed.

Weakest Password Used in CTP OS Flaw

A weakness in the configuration transfer protocol (CTP) OS that enables remote, unauthenticated attackers to potentially take full control of the device was also patched. Tracked as CVE-2026-33771, the vulnerability arose due to settings related to password complexity requirements not being saved, resulting in the use of weak passwords that could be easily guessed and exploited.

Multiple High-Severity Flaws Identified in Junos OS

  • Ability to cause denial-of-service conditions
  • Gain root privileges

Additional security defects addressed by Juniper Networks include several medium-severity vulnerabilities that could enable attackers to cause denial-of-service conditions, execute commands with elevated privileges, and bypass configured firewall filters.

According to Juniper Networks, however, it is not aware of any exploits of these vulnerabilities in the wild.

Company Encourages Users to Review Advisories Carefully

The company provided additional information about the patch releases on its support portal, encouraging users to review the advisories carefully and apply the necessary updates promptly.


Blog Image

About Author

en_USEnglish