| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-33791 | Junos OS and Junos OS Evolved: Execution of crafted CLI commands allows for arbitrary shell injection as root | Juniper Networks | Junos OS | Medium | 6.7 | 2026-04-09 21:38:53 | Deep Dive |
| CVE-2026-33790 | Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 packet will cause the srxpfe process to crash and restart. | Juniper Networks | Junos OS | High | 7.5 | 2026-04-09 21:38:08 | Deep Dive |
| CVE-2026-33787 | Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes | Juniper Networks | Junos OS | Medium | 5.5 | 2026-04-09 21:37:31 | Deep Dive |
| CVE-2026-33785 | Junos OS: MX Series: Missing Authorization for specific 'request' CLI commands in a JDM/CSDS scenario | Juniper Networks | Junos OS | High | 8.8 | 2026-04-09 21:37:04 | Deep Dive |
| CVE-2026-33784 | JSI Virtual Lightweight Collector: Default password is not required to be changed which allows unauthorized high-privileged access | Juniper Networks | JSI LWC | Critical | 9.8 | 2026-04-09 21:36:38 | Deep Dive |
| CVE-2026-33783 | Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftmand crashes | Juniper Networks | Junos OS Evolved | Medium | 6.5 | 2026-04-09 21:36:14 | Deep Dive |
| CVE-2026-33781 | Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed | Juniper Networks | Junos OS | Medium | 6.5 | 2026-04-09 21:35:48 | Deep Dive |
| CVE-2026-33778 | Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is received kmd/iked crashes | Juniper Networks | Junos OS | High | 7.5 | 2026-04-09 21:35:11 | Deep Dive |
| CVE-2026-33776 | Junos OS and Junos OS Evolved: Specific low privileged CLI command exposes sensitive information | Juniper Networks | Junos OS | Medium | 5.5 | 2026-04-09 21:34:50 | Deep Dive |
| CVE-2026-33774 | Junos OS: MX Series: Firewall filters on lo0.<non-0> in the default routing instance are not in effect | Juniper Networks | Junos OS | Medium | 6.5 | 2026-04-09 21:34:21 | Deep Dive |
| CVE-2026-33771 | CTP OS: Configuring password requirements does not work which permits the use of weak passwords | Juniper Networks | CTP OS | High | 7.4 | 2026-04-09 21:33:57 | Deep Dive |
| CVE-2025-13914 | Apstra: SSH host key validation vulnerability for managed devices | Juniper Networks | Apstra | High | 8.7 | 2026-04-09 21:32:15 | Deep Dive |
| CVE-2026-33797 | Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset | Juniper Networks | Junos OS | High | 7.4 | 2026-04-09 21:31:23 | Deep Dive |
| CVE-2026-33779 | Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communication | Juniper Networks | Junos OS | Medium | 6.5 | 2026-04-09 21:30:57 | Deep Dive |
| CVE-2026-33775 | Junos OS: MX Series: Mismatch between configured and received packet types causes memory leak in bbe-smgd | Juniper Networks | Junos OS | Medium | 6.5 | 2026-04-09 21:30:09 | Deep Dive |
| CVE-2026-33782 | Junos OS: MX Series: In specific DHCPv6 scenarios jdhcpd memory increases continuously with subscriber logouts | Juniper Networks | Junos OS | Medium | 6.5 | 2026-04-09 21:29:45 | Deep Dive |
| CVE-2026-33780 | Junos OS and Junos OS Evolved: In an EVPN-MPLS scenario churn of ESI routes causes a memory leak in l2ald | Juniper Networks | Junos OS | Medium | 6.5 | 2026-04-09 21:29:21 | Deep Dive |
| CVE-2026-33773 | Junos OS: EX Series, QFX Series: If the same egress filter is configured on both an IRB and a physical interface one of those is not applied | Juniper Networks | Junos OS | Medium | 5.8 | 2026-04-09 21:28:57 | Deep Dive |
| CVE-2026-33786 | Junos OS: SRX1600, SRX2300, SRX4300: When a specific show command is executed chassisd crashes | Juniper Networks | Junos OS | Medium | 5.5 | 2026-04-09 21:28:30 | Deep Dive |
| CVE-2026-21916 | Junos OS: A low privileged user can escalate their privileges so that they can login as root | Juniper Networks | Junos OS | High | 7.3 | 2026-04-09 21:28:06 | Deep Dive |