Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, a local low privileged user can compromise the system
Summary
| CVE | CVE-2026-33793 |
|---|---|
| State | PUBLISHED |
| Assigner | juniper |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-09 22:16:29 UTC |
| Updated | 2026-04-16 18:42:26 UTC |
| Description | An Execution with Unnecessary Privileges vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to gain root privileges, thus compromising the system. When a configuration that allows unsigned Python op scripts is present on the device, a non-root user is able to execute malicious op scripts as a root-equivalent user, leading to privilege escalation. This issue affects Junos OS: * All versions before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S6, * from 24.2 before 24.2R1-S2, 24.2R2, * from 24.4 before 24.4R1-S2, 24.4R2; Junos OS Evolved: * All versions before 22.4R3-S7-EVO, * from 23.2 before 23.2R2-S4-EVO, * from 23.4 before 23.4R2-S6-EVO, * from 24.2 before 24.2R2-EVO, * from 24.4 before 24.4R1-S1-EVO, 24.4R2-EVO. |
Risk And Classification
Primary CVSS: v4.0 8.5 HIGH from [email protected]
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber
EPSS: 0.000070000 probability, percentile 0.004890000 (date 2026-04-21)
Problem Types: CWE-250 | CWE-250 CWE-250: Execution with Unnecessary Privileges
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 4.0 | [email protected] | Secondary | 8.5 | HIGH | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/C... |
| 4.0 | CNA | CVSS | 8.5 | HIGH | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/AU:Y/... |
| 3.1 | [email protected] | Secondary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v4.0 Breakdown
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber
CVSS v3.1 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Junos | All | All | All | All |
| Operating System | Juniper | Junos | 22.4 | - | All | All |
| Operating System | Juniper | Junos | 22.4 | r1 | All | All |
| Operating System | Juniper | Junos | 22.4 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 22.4 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 22.4 | r2 | All | All |
| Operating System | Juniper | Junos | 22.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 22.4 | r2-s2 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3-s1 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3-s2 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3-s3 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3-s4 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3-s5 | All | All |
| Operating System | Juniper | Junos | 22.4 | r3-s6 | All | All |
| Operating System | Juniper | Junos | 23.2 | - | All | All |
| Operating System | Juniper | Junos | 23.2 | r1 | All | All |
| Operating System | Juniper | Junos | 23.2 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 23.2 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 23.2 | r2 | All | All |
| Operating System | Juniper | Junos | 23.2 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 23.2 | r2-s2 | All | All |
| Operating System | Juniper | Junos | 23.2 | r2-s3 | All | All |
| Operating System | Juniper | Junos | 23.4 | - | All | All |
| Operating System | Juniper | Junos | 23.4 | r1 | All | All |
| Operating System | Juniper | Junos | 23.4 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 23.4 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 23.4 | r2 | All | All |
| Operating System | Juniper | Junos | 23.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos | 23.4 | r2-s2 | All | All |
| Operating System | Juniper | Junos | 23.4 | r2-s3 | All | All |
| Operating System | Juniper | Junos | 23.4 | r2-s4 | All | All |
| Operating System | Juniper | Junos | 23.4 | r2-s5 | All | All |
| Operating System | Juniper | Junos | 24.2 | - | All | All |
| Operating System | Juniper | Junos | 24.2 | r1 | All | All |
| Operating System | Juniper | Junos | 24.2 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 24.2 | r2 | All | All |
| Operating System | Juniper | Junos | 24.4 | - | All | All |
| Operating System | Juniper | Junos | 24.4 | r1 | All | All |
| Operating System | Juniper | Junos | 24.4 | r2 | All | All |
| Operating System | Juniper | Junos Os Evolved | All | All | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | - | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r1-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r1-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r2-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3-s3 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3-s4 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3-s5 | All | All |
| Operating System | Juniper | Junos Os Evolved | 22.4 | r3-s6 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | - | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r1-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r1-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r2-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r2-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.2 | r2-s3 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | - | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r1-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r1-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r2-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r2-s3 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r2-s4 | All | All |
| Operating System | Juniper | Junos Os Evolved | 23.4 | r2-s5 | All | All |
| Operating System | Juniper | Junos Os Evolved | 24.2 | - | All | All |
| Operating System | Juniper | Junos Os Evolved | 24.2 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 24.2 | r1-s2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 24.4 | - | All | All |
| Operating System | Juniper | Junos Os Evolved | 24.4 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 24.4 | r2 | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Juniper Networks | Junos OS | affected 22.4R3-S7 semver | Not specified |
| CNA | Juniper Networks | Junos OS | affected 23.2 23.2R2-S4 semver | Not specified |
| CNA | Juniper Networks | Junos OS | affected 23.4 23.4R2-S6 semver | Not specified |
| CNA | Juniper Networks | Junos OS | affected 24.2 24.2R1-S2, 24.2R2 semver | Not specified |
| CNA | Juniper Networks | Junos OS | affected 24.4 24.4R1-S2, 24.4R2 semver | Not specified |
| CNA | Juniper Networks | Junos OS Evolved | affected 22.4R3-S7-EVO semver | Not specified |
| CNA | Juniper Networks | Junos OS Evolved | affected 23.2 23.2R2-S4-EVO semver | Not specified |
| CNA | Juniper Networks | Junos OS Evolved | affected 23.4 23.4R2-S6-EVO semver | Not specified |
| CNA | Juniper Networks | Junos OS Evolved | affected 24.2 24.2R2-EVO semver | Not specified |
| CNA | Juniper Networks | Junos OS Evolved | affected 24.4 24.4R1-S1-EVO, 24.4R2-EVO semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| supportportal.juniper.net/JSA103142 | [email protected] | supportportal.juniper.net | Mitigation, Vendor Advisory |
| kb.juniper.net/JSA103142 | MITRE | kb.juniper.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-04-08T16:00:00.000Z | Initial Publication |
| CNA | 2026-04-16T16:00:00.000Z | While 'language python3' allows an attacker to execute local Python scripts, the scenario with the highest risk of malicious exploitation occurs when an attacker can execute remote Python scripts |
Solutions
CNA: The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S6-EVO, 24.2R2-EVO, 24.4R1-S1-EVO, 24.4R2-EVO, 25.2R1-EVO and all subsequent releases. Junos OS: 22.4R3-S7, 23.2R2-S4, 23.4R2-S6, 24.2R1-S2, 24.2R2, 24.4R1-S2, 24.4R2, 25.2R1 and all subsequent releases.
Workarounds
CNA: Use access lists or firewall filters to limit access to the CLI only from trusted hosts and administrators.
Exploits
CNA: Juniper SIRT is not aware of any malicious exploitation of this vulnerability.