Medium severity5.5NVD Advisory· Published Apr 9, 2026· Updated Apr 17, 2026
CVE-2026-33787
CVE-2026-33787
Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600 allows a local attacker with low privileges to cause a complete Denial of Service (DoS).
When a specific 'show chassis' CLI command is executed, chassisd crashes and restarts which causes a momentary impact to all traffic until all modules are online again.
This issue affects Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600:
- 23.2 versions before 23.2R2-S6,
- 23.4 versions before 23.4R2-S7
- 24.2 versions before 24.2R2-S2,
- 24.4 versions before 24.4R2,
- 25.2 versions before 25.2R1-S1, 25.2R2.
Affected products
35cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*+ 34 more
- cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.2:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:24.4:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:25.2:r2:*:*:*:*:*:*
- (no CPE)range: >= 23.2 < 23.2R2-S6, >= 23.4 < 23.4R2-S7, >= 24.2 < 24.2R2-S2, >= 24.4 < 24.4R2, >= 25.2 < 25.2R1-S1, 25.2R2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- kb.juniper.net/JSA107873nvdMitigationVendor Advisory
News mentions
0No linked articles in our index yet.