CVE-2026-33791

MEDIUM

Junos OS and Junos OS Evolved: Execution of crafted CLI commands allows for arbitrary shell injection as root

Title source: cna
STIX 2.1

Description

An OS Command Injection vulnerability in the CLI processing of Juniper Networks Junos OS and Junos OS Evolved allows a local, high-privileged attacker executing specific, crafted CLI commands to inject arbitrary shell commands as root, leading to a complete compromise of the system. Certain 'set system' commands, when executed with crafted arguments, are not properly sanitized, allowing for arbitrary shell injection. These shell commands are executed as root, potentially allowing for complete control of the vulnerable system. This issue affects: Junos OS:  * all versions before 22.4R3-S8,  * from 23.2 before 23.2R2-S5,  * from 23.4 before 23.4R2-S7,  * from 24.2 before 24.2R2-S2,  * from 24.4 before 24.4R2,  * from 25.2 before 25.2R2;  Junos OS Evolved:  * all versions before 22.4R3-S8-EVO,  * from 23.2 before 23.2R2-S5-EVO,  * from 23.4 before 23.4R2-S7-EVO,  * from 24.2 before 24.2R2-S2-EVO,  * from 24.4 before 24.4R2-EVO,  * from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.

Scores

CVSS v3 6.7
EPSS 0.0001
EPSS Percentile 2.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (7)
juniper/junos 22.4 (15 CPE variants)
juniper/junos 23.2 (9 CPE variants)
juniper/junos 23.4 (11 CPE variants)
juniper/junos 24.2 (6 CPE variants)
juniper/junos 24.4 (4 CPE variants)
juniper/junos 25.2 (4 CPE variants)
juniper/junos < 22.4
Published Apr 09, 2026
Tracked Since Apr 10, 2026