CVE-2026-33791
Severity CVSS v4.0:
HIGH
Type:
CWE-78
OS Command Injections
Publication date:
09/04/2026
Last modified:
09/04/2026
Description
An OS Command Injection vulnerability in the CLI processing of Juniper Networks Junos OS and Junos OS Evolved allows a local, high-privileged attacker executing specific, crafted CLI commands to inject arbitrary shell commands as root, leading to a complete compromise of the system.<br />
<br />
Certain &#39;set system&#39; commands, when executed with crafted arguments, are not properly sanitized, allowing for arbitrary shell injection. These shell commands are executed as root, potentially allowing for complete control of the vulnerable system.<br />
This issue affects:<br />
<br />
Junos OS: <br />
<br />
<br />
<br />
* all versions before 22.4R3-S8, <br />
* from 23.2 before 23.2R2-S5, <br />
* from 23.4 before 23.4R2-S7, <br />
* from 24.2 before 24.2R2-S2, <br />
* from 24.4 before 24.4R2, <br />
* from 25.2 before 25.2R2; <br />
<br />
<br />
<br />
<br />
Junos OS Evolved: <br />
<br />
<br />
<br />
* all versions before 22.4R3-S8-EVO, <br />
* from 23.2 before 23.2R2-S5-EVO, <br />
* from 23.4 before 23.4R2-S7-EVO, <br />
* from 24.2 before 24.2R2-S2-EVO, <br />
* from 24.4 before 24.4R2-EVO, <br />
* from 25.2 before 25.2R1-S1-EVO, 25.2R2-EVO.
Impact
Base Score 4.0
8.40
Severity 4.0
HIGH
Base Score 3.x
6.70
Severity 3.x
MEDIUM



