8.8

CVE-2026-33785

Junos OS: MX Series: Missing Authorization for specific 'request' CLI commands in a JDM/CSDS scenario

A Missing Authorization vulnerability in the CLI of Juniper Networks Junos OS on MX Series allows a local, authenticated user with low privileges to execute specific commands which will lead to a complete compromise of managed devices.

Any user logged in, without requiring specific privileges, can issue 'request csds' CLI operational commands. These commands are only meant to be executed by high privileged or users designated for Juniper Device Manager (JDM) / Connected Security Distributed Services (CSDS) operations as they will impact all aspects of the devices managed via the respective MX.

This issue affects Junos OS on MX Series:



  *  24.4 releases before 24.4R2-S3, 
  *  25.2 releases before 25.2R2.




This issue does not affect Junos OS releases before 24.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version24.4 Update-
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version24.4 Updater1
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version24.4 Updater1-s2
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version24.4 Updater1-s3
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version24.4 Updater2
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version24.4 Updater2-s1
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version24.4 Updater2-s2
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version25.2 Update-
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version25.2 Updater1
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version25.2 Updater1-s1
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
JuniperJunos Version25.2 Updater1-s2
   JuniperMx10004 Version-
   JuniperMx10008 Version-
   JuniperMx2008 Version-
   JuniperMx2010 Version-
   JuniperMx2020 Version-
   JuniperMx204 Version-
   JuniperMx240 Version-
   JuniperMx301 Version-
   JuniperMx304 Version-
   JuniperMx480 Version-
   JuniperMx960 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.005
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 8.8 2 6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
sirt@juniper.net 6.3 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.