๐Ÿ” CVE Alert

CVE-2026-33771

HIGH 7.4

CTP OS: Configuring password requirements does not work which permits the use of weak passwords

CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
11th

A Weak Password Requirements vulnerability in the password management function of Juniper Networks CTP OS might allow an unauthenticated, network-based attacker to exploit weak passwords of local accounts and potentially take full control of the device. The password management menu enables the administrator to set password complexity requirements, but these settings are not saved. The issue can be verified with the menu option "Show password requirements". Failure to enforce the intended requirements can lead to weak passwords being used, which significantly increases the likelihood that an attacker can guess these and subsequently attain unauthorized access. This issue affects CTP OS versions 9.2R1 and 9.2R2.

CWE CWE-521
Vendor juniper networks
Product ctp os
Published Apr 9, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for juniper networks ctp os

Be the first to know when new high vulnerabilities affecting juniper networks ctp os are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Juniper Networks / CTP OS
9.2R1 โ‰ค 9.2R2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
kb.juniper.net: https://kb.juniper.net/JSA107864