CVE-2026-33788
Received Received - Intake
Missing Authentication in Juniper Junos PTX FPCs Enables Privilege Escalation

Publication date: 2026-04-09

Last updated on: 2026-04-09

Assigner: Juniper Networks, Inc.

Description
A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPCs) of Juniper Networks Junos OS Evolved on PTX Series allows a local, authenticated attacker with low privileges to gain direct access to FPCs installed in the device. A local user with low privileges can gain direct access to the installed FPCs as a high privileged user, which can potentially lead to a full compromise of the affected component. This issue affectsΒ Junos OS Evolved on PTX10004, PTX10008, PTX100016, with JNP10K-LC1201 or JNP10K-LC1202: * All versions before 21.2R3-S8-EVO, * 21.4-EVO versions before 21.4R3-S7-EVO, * 22.2-EVO versions before 22.2R3-S4-EVO, * 22.3-EVO versions before 22.3R3-S3-EVO, * 22.4-EVO versions before 22.4R3-S2-EVO, * 23.2-EVO versions before 23.2R2-EVO.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
juniper_networks junos_os_evolved to 21.2R3-S8-EVO (exc)
juniper_networks junos_os_evolved to 21.4R3-S7-EVO (exc)
juniper_networks junos_os_evolved to 22.2R3-S4-EVO (exc)
juniper_networks junos_os_evolved to 22.3R3-S3-EVO (exc)
juniper_networks junos_os_evolved to 22.4R3-S2-EVO (exc)
juniper_networks junos_os_evolved to 23.2R2-EVO (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Missing Authentication for Critical Function issue in the Flexible PIC Concentrators (FPCs) of Juniper Networks Junos OS Evolved on PTX Series devices.

It allows a local, authenticated attacker with low privileges to gain direct access to the installed FPCs as a high privileged user.

Essentially, a user with limited access rights can escalate their privileges and control critical components of the device without proper authentication.


How can this vulnerability impact me? :

The vulnerability can lead to a full compromise of the affected component, as a low privileged local user can gain high privileged access to the Flexible PIC Concentrators.

This means that an attacker could potentially control critical hardware components of the device, which could impact the device's operation, security, and the network it supports.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart