CVE-2026-33793

CWE-2504 documents4 sources
Severity
8.5HIGH
EPSS
0.0%
top 97.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9
Latest updateApr 10

Description

An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system. When a configuration that allows unsigned Python op scripts is present on the device, a non-root user is able to execute malicious op scripts as a root-equivalent user, leading to privilege escalation. This issue affects Junos OS: * All versions before 22.4R3-S7, * from

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved23.223.2R2-S4-EVO+4
CVEListV5juniper_networks/junos_os23.223.2R2-S4+4

🔴Vulnerability Details

3
VulDB
Juniper Junos OS/Junos OS Evolved User Interface unnecessary privileges (JSA103142)2026-04-10
GHSA
GHSA-fc25-pm3m-2gqh: An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, lo2026-04-10
CVEList
Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, a local low privileged user can compromise the system2026-04-09
CVE-2026-33793 (HIGH CVSS 8.5) | An Execution with Unnecessary Privi | cvebase.io