Juniper Junos OS MX Series Missing Authorization Vulnerability
CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.
Juniper Networks Junos OS on MX Series is vulnerable to a missing authorization issue (CVE-2026-33785). This vulnerability allows a local, authenticated user with low privileges to execute specific CLI operational commands, specifically ‘request csds’, that should only be available to high-privileged users or those designated for Juniper Device Manager (JDM) / Connected Security Distributed Services (CSDS) operations. Successful exploitation leads to a complete compromise of managed devices. This issue affects Junos OS on MX Series versions 24.4 prior to 24.4R2-S3 and 25.2 prior to 25.2R2. Releases prior to 24.4 are not affected. The vulnerability was published on 2026-04-09.
Attack Chain
- Attacker gains local, low-privilege access to a Junos OS MX Series device.
- Attacker authenticates to the Junos OS CLI using their credentials.
- Attacker executes the ‘request csds’ operational command.
- The system fails to perform adequate authorization checks before executing the command.
- The ‘request csds’ command executes with elevated privileges due to the missing authorization.
- Attacker leverages the elevated privileges to modify system configurations.
- Attacker installs malicious software or backdoors.
- Attacker achieves complete compromise of the Junos OS MX Series device, potentially impacting all devices managed by it.
Impact
Successful exploitation of CVE-2026-33785 allows an attacker to completely compromise a Juniper Junos OS MX Series device. This can lead to unauthorized access to sensitive data, disruption of network services, and the potential compromise of other devices managed by the affected MX Series device. The vulnerability affects Junos OS on MX Series versions 24.4 before 24.4R2-S3 and 25.2 before 25.2R2. While the exact number of vulnerable devices is unknown, the impact is critical due to the potential for widespread network compromise.
Recommendation
- Upgrade Junos OS on MX Series devices to versions 24.4R2-S3 or later, or 25.2R2 or later, to patch CVE-2026-33785.
- Implement the provided Sigma rule to detect unauthorized execution of the
request csdscommand. - Monitor Junos OS CLI command logs for suspicious activity, specifically focusing on the
request csdscommand and user privilege levels.
Detection coverage 2
Detect Unauthorized Request CSDS Command Execution
criticalDetects execution of the 'request csds' command by low-privileged users on Juniper Junos OS
Detect Junos Unauthorized Command Execution via Firewall Logs
highDetects attempts to execute unauthorized commands by monitoring firewall logs on Junos devices.
Detection queries are kept inside the platform. Get full rules →