CVE-2026-33793
Privilege Escalation via Unsigned Python Scripts in Junos OS
Publication date: 2026-04-09
Last updated on: 2026-04-16
Assigner: Juniper Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.2 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | 23.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2 |
| juniper | junos | to 22.4 (exc) |
| juniper | junos | 22.4 |
| juniper | junos | 23.2 |
| juniper | junos | 23.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 24.4 |
| juniper | junos | 23.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | to 22.4 (exc) |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 24.2 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 24.4 |
| juniper | junos_os_evolved | 24.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-250 | The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Junos OS or Junos OS Evolved device is updated to a fixed version that addresses this issue.
- Upgrade to Junos OS versions 22.4R3-S7 or later, 23.2R2-S4 or later, 23.4R2-S6 or later, 24.2R1-S2 or later, or 24.4R1-S2 or later as applicable.
- Upgrade to Junos OS Evolved versions 22.4R3-S7-EVO or later, 23.2R2-S4-EVO or later, 23.4R2-S6-EVO or later, 24.2R2-EVO or later, or 24.4R1-S1-EVO or later as applicable.
Additionally, review and disable any configurations that allow unsigned Python op scripts to run, as this configuration enables the privilege escalation.
Can you explain this vulnerability to me?
This vulnerability is an Execution with Unnecessary Privileges issue in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved. It allows a local, low-privileged attacker to gain root privileges on the system.
Specifically, when a configuration that permits unsigned Python operational scripts is present on the device, a non-root user can execute malicious operational scripts with root-equivalent privileges, leading to privilege escalation.
How can this vulnerability impact me? :
This vulnerability can have a significant impact as it allows a local attacker with low privileges to escalate their privileges to root level. This means the attacker can fully compromise the affected system, potentially gaining complete control over it.
Such a compromise can lead to unauthorized access, modification, or destruction of data, disruption of services, and further exploitation of the network or connected systems.