6.8

CVE-2026-33787

Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes

An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis control daemon (chassisd) of Juniper Networks Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600 allows a local attacker with low privileges to cause a complete Denial of Service (DoS).

When a specific 'show chassis' CLI command is executed, chassisd crashes and restarts which causes a momentary impact to all traffic until all modules are online again.



This issue affects Junos OS on SRX1500, SRX4100, SRX4200 and SRX4600: 



  *  23.2 versions before 23.2R2-S6,
  *  23.4 versions before 23.4R2-S7
  *  24.2 versions before 24.2R2-S2,
  *  24.4 versions before 24.4R2,
  *  25.2 versions before 25.2R1-S1, 25.2R2.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version23.2 Update-
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater1-s1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater1-s2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater2-s1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater2-s2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater2-s3
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater2-s4
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.2 Updater2-s5
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Update-
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater1-s1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater1-s2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2-s1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2-s2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2-s3
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2-s4
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2-s5
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version23.4 Updater2-s6
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.2 Update-
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.2 Updater1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.2 Updater1-s1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.2 Updater1-s2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.2 Updater2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.2 Updater2-s1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.4 Update-
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.4 Updater1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.4 Updater1-s2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version24.4 Updater1-s3
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version25.2 Update-
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version25.2 Updater1
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
JuniperJunos Version25.2 Updater2
   JuniperSrx1500 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.04
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
sirt@juniper.net 6.8 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:M/U:X
CWE-754 Improper Check for Unusual or Exceptional Conditions

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.