Cyber Posture

CVE-2026-33784

Critical

Published: 09 April 2026

Published
09 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 17.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33784 is a critical-severity Use of Default Password (CWE-1393) vulnerability in Juniper Networks Support (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 17.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires changing default authenticators prior to first use, preventing exploitation of the unchanged default password for the high-privileged account in vLWC.

prevent

Ensures proper management of accounts, including high-privileged ones, by disabling unnecessary accounts and enforcing secure provisioning without default credentials.

prevent

Mandates timely remediation of identified flaws, such as upgrading vLWC to version 3.0.94 or later to address the default password vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability is the use of default passwords on a high-privileged account without enforcement of change, directly enabling remote unauthenticated attackers to obtain and abuse default credentials for full device compromise (Initial Access).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A Use of Default Password vulnerability in the Juniper Networks Support Insights (JSI) Virtual Lightweight Collector (vLWC) allows an unauthenticated, network-based attacker to take full control of the device. vLWC software images ship with an initial password for a high…

more

privileged account. A change of this password is not enforced during the provisioning of the software, which can make full access to the system by unauthorized actors possible.This issue affects all versions of vLWC before 3.0.94.

Deeper analysisAI

CVE-2026-33784 is a Use of Default Password vulnerability (CWE-1393) in the Juniper Networks Support Insights (JSI) Virtual Lightweight Collector (vLWC). The vLWC software images ship with an initial password for a high-privileged account, and a change of this password is not enforced during provisioning. This flaw affects all versions of vLWC prior to 3.0.94 and has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for complete compromise.

An unauthenticated, network-based attacker can exploit this vulnerability by using the default credentials to gain full control of the affected vLWC device. No special privileges, user interaction, or complex conditions are required, allowing remote exploitation over the network.

The Juniper Networks security advisory at https://kb.juniper.net/JSA107871 provides details on mitigation, which includes upgrading to vLWC version 3.0.94 or later where the issue is addressed.

Details

CWE(s)

Affected Products

Juniper
Networks Support
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-49559Shared CWE-1393
CVE-2025-2347Shared CWE-1393
CVE-2025-22938Shared CWE-1393
CVE-2026-4404Shared CWE-1393
CVE-2025-26793Shared CWE-1393
CVE-2026-24429Shared CWE-1393
CVE-2026-22886Shared CWE-1393
CVE-2025-26701Shared CWE-1393
CVE-2025-66050Shared CWE-1393
CVE-2025-14917Shared CWE-1393

References