Vulnerability Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1600, SRX2300 and SRX4300 allows a local attacker with low privileges to cause a complete Denial of Service (DoS). When a specific 'show chassis' CLI command is executed, chassisd crashes and restarts which causes a momentary impact to all traffic until all modules are online again. This issue affects Junos OS on SRX1600, SRX2300 and SRX4300: * 24.4 versions before 24.4R1-S3, 24.4R2. This issue does not affect Junos OS versions before 24.4R1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 24.4 |
| Juniper | Srx1600 | - |
| Juniper | Srx2300 | - |
| Juniper | Srx4300 | - |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA107810MitigationVendor Advisory
FAQ
What is CVE-2026-33786?
CVE-2026-33786 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1600, SRX2300 and SRX4300 allows a local attacker with...
How severe is CVE-2026-33786?
CVE-2026-33786 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33786?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Srx1600, Juniper Srx2300, Juniper Srx4300.