Execution with Unnecessary Privileges Vulnerability in Juniper Networks Junos OS
CVE-2026-33793

8.5HIGH

Key Information:

Vendor
CVE Published:
9 April 2026

Badges

👾 Exploit Exists

What is CVE-2026-33793?

A vulnerability in the user interface (UI) of Juniper Networks Junos OS and Junos OS Evolved enables a local, low-privileged attacker to escalate privileges to root. When a configuration permits unsigned Python op scripts, a non-root user can execute harmful op scripts, gaining root-equivalent access and compromising the system's integrity. This includes multiple versions across both Junos OS and Junos OS Evolved, making it crucial for users to apply the latest updates to mitigate this security risk.

Affected Version(s)

Junos OS 0 < 22.4R3-S7

Junos OS 23.2 < 23.2R2-S4

Junos OS 23.4 < 23.4R2-S6

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.