CRITICALZero Day
Verified
Global

UNC3886 Deploys Firmware Rootkit on Juniper MX Routers via Zero-Day

Tuesday, March 31, 2026 at 10:00 AM UTC·Source: Mandiant

Updated: Wednesday, April 1, 2026 at 06:00 AM UTC

Executive Summary

UNC3886 exploits Juniper Junos zero-day to deploy firmware-level rootkits on MX-series routers. Implant survives software upgrades and factory resets.

Analysis

Mandiant identified UNC3886 exploiting CVE-2026-29001 in Juniper Junos OS to install firmware-level rootkits on MX-series routers used by ISPs and large enterprises. The implant, dubbed TinyShell.Router, intercepts and exfiltrates network traffic while maintaining persistence across software upgrades. Discovery came during an IR engagement at a European telecom.

Timeline

Discovered
Mar 20, 2026
Exploitation Detected
Mar 20, 2026
Published
Mar 31, 2026

Indicators of Compromise (1)

CVE (1)
CVE-2026-29001
Source Attribution

Originally published by Mandiant on Mar 31, 2026. Verified by: Mandiant, CISA, Juniper.

Related Threats