A Use of Default Password vulnerability in the Juniper Networks
Support Insights (JSI)
Virtual Lightweight Collector (vLWC) allows an unauthenticated, network-based attacker to take full control of the device.
vLWC software images ship with an initial password for a high privileged account. A change of this password is not enforced during the provisioning of the software, which can make full access to the system by unauthorized actors possible.This issue affects all versions of vLWC before 3.0.94.
References
| Link | Resource |
|---|---|
| https://kb.juniper.net/JSA107871 |
Configurations
No configuration.
History
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-13 15:02
NVD link : CVE-2026-33784
Mitre link : CVE-2026-33784
CVE.ORG link : CVE-2026-33784
JSON object : View
Products Affected
No product.
CWE
CWE-1393
Use of Default Password
