Juniper default password flaw can hand attackers full control of vLWC appliances


Juniper Networks has disclosed a critical flaw in its Support Insights Virtual Lightweight Collector that can let an unauthenticated attacker take full control of the device over the network if the default high-privilege password was never changed. The issue is tracked as CVE-2026-33784 and affects JSI vLWC versions before 3.0.94.

This is a default-password problem, but the impact is unusually severe. Juniper says vLWC images ship with an initial password for a highly privileged account, and the product did not force admins to replace that password during provisioning. That leaves exposed appliances open to takeover if they still use the factory-set credential.

The severity score reflects that risk. Public vulnerability listings and downstream advisories place CVE-2026-33784 at 9.8 on the CVSS v3.1 scale, with network access, low attack complexity, no required privileges, and no user interaction.

Why this Juniper flaw matters

A successful login with the default privileged password gives an attacker broad control over the appliance. That can mean access to sensitive support and diagnostic data, configuration changes, service disruption, and a possible foothold for deeper movement inside the network. Those outcomes follow directly from Juniper’s description that the flaw can allow full control of the device.

The affected product is not Junos itself but JSI vLWC, which many organizations use to support automated monitoring and support workflows in Juniper environments. Canada’s Cyber Centre included JSI vLWC versions prior to 3.0.94 in its April 9 advisory roundup and urged administrators to review Juniper’s guidance and apply the necessary updates.

Juniper says it found the issue internally. At the time reflected in the advisory trail, no public evidence pointed to active exploitation in the wild, but default-password weaknesses rarely stay quiet for long once they become public because they are easy to scan and easy to automate.

Affected versions and fix

The vulnerable range covers all Juniper Support Insights Virtual Lightweight Collector versions before 3.0.94. Juniper’s remedy is straightforward: upgrade to 3.0.94 or later.

If an immediate upgrade is not possible, Juniper says administrators can still change the password through the device setup menu. That does not replace patching, but it closes the most dangerous exposure if the system still uses the original credential.

Quick view

ItemDetails
CVECVE-2026-33784
ProductJuniper Networks Support Insights Virtual Lightweight Collector
SeverityCVSS 9.8
Attack typeUnauthenticated, network-based access via default privileged password
Affected versionsAll vLWC versions before 3.0.94
FixUpgrade to 3.0.94 or later
Temporary mitigationChange the default admin password in the setup menu

What administrators should do now

  • Upgrade every affected JSI vLWC appliance to version 3.0.94 or later.
  • Check whether any deployed collector still uses the factory-set privileged password.
  • Change that password immediately if patching cannot happen at once.
  • Restrict network exposure to vLWC systems and review who can reach them. This step is a reasonable defensive measure because the issue is network-reachable and unauthenticated.
  • Review logs and recent access activity for any sign of unexpected administrative logins. This is a prudent response given the full-control impact described in the advisory.

FAQ

What is CVE-2026-33784?

It is a default-password vulnerability in Juniper Networks Support Insights Virtual Lightweight Collector that can let an unauthenticated attacker take full control of the device over the network if the initial privileged password was never changed.

Which versions are affected?

All JSI vLWC versions before 3.0.94 are affected.

Did Juniper report active exploitation?

The advisory trail available publicly does not report known in-the-wild exploitation at the time of disclosure.

What is the fastest fix?

Upgrade to version 3.0.94 or later. If you cannot patch immediately, change the default privileged password through the device setup menu right away.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages