High Severity Junos OS Arbitrary Code Execution Vulnerability Fixed
Summary
ACN issued Alert AL05/260423/CSIRT-ITA warning of a high-severity arbitrary code execution vulnerability in Juniper Networks' Junos OS and Junos OS Evolved. The vulnerability, CVE-2026-33791, could allow a malicious user with elevated privileges to execute arbitrary code by bypassing security features on affected systems. Multiple versions of Junos OS and Junos OS Evolved across six release branches are affected, with ACN recommending users update to patched versions as specified in Juniper's security bulletin.
Organizations running Junos OS or Junos OS Evolved should inventory their deployments against the affected version ranges listed (22.4R3-S8 and earlier, 23.2, 23.4, 24.2, 24.4, 25.2 for both OS and Evolved variants). Given the arbitrary code execution vector with elevated privileges, security teams should treat this as priority remediation for any internet-facing or high-trust network infrastructure.
About this source
GovPing monitors Italy ACN News alt for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.
What changed
ACN published a security alert regarding CVE-2026-33791, a high-severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved that could allow an authenticated attacker with elevated privileges to execute arbitrary code by bypassing security mechanisms. The alert covers affected version ranges for both Junos OS and Junos OS Evolved across multiple release branches including versions prior to 22.4R3-S8, 23.2, 23.4, 24.2, 24.4, and 25.2. Organizations running Juniper network infrastructure should review the Juniper support portal security bulletin and apply available patches to mitigate the arbitrary code execution risk.
Network operators and security teams managing Junos OS or Junos OS Evolved deployments should identify affected versions in their infrastructure and prioritize patching given the arbitrary code execution capability and root privilege escalation potential. Critical infrastructure and telecommunications providers relying on Juniper equipment should treat this as a priority remediation item.
What to do next
- Update to fixed versions per Juniper security bulletin
Archived snapshot
Apr 23, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Juniper Networks: risolta vulnerabilità in Junos OS e Junos OS Evolved
**
Alert**
AL05/260423/CSIRT-ITA
Condividi
- Facebook
- Twitter
- LinkedIn
- Whatsapp
Sintesi
Juniper Networks ha rilasciato aggiornamenti per risolvere una vulnerabilità con gravità “alta”, nei sistemi operativi Junos OS e Junos OS Evolved. Tale vulnerabilità, potrebbe permettere ad un utente malintenzionato con privilegi elevati, di eseguire codice arbitrario eludendo le funzionalità di sicurezza sui sistemi interessati.
Tipologia
- Arbitrary Code Execution
- Security Feature Bypass
Prodotti e/o versioni affette
Junos OS
- versioni precedenti alla 22.4R3-S8
- 23.2, versioni precedenti alla 23.2R2-S5
- 23.4, versioni precedenti alla 23.4R2-S7
- 24.2, versioni precedenti alla 24.2R2-S2
- 24.4, versioni precedenti alla 24.4R2
25.2, versioni precedenti alla 25.2R2
Junos OS Evolvedversioni precedent alla 22.4R3-S8-EVO
23.2, versioni precedenti alla 23.2R2-S5-EVO
23.4, versioni precedenti alla 23.4R2-S7-EVO
24.2, versioni precedenti alla 24.2R2-S2-EVO
24.4, versioni precedenti alla 24.4R2-EVO
25.2, versioni precedenti alla 25.2R1-S1-EVO, 25.2R2-EVO
Azioni di mitigazione
In linea con le dichiarazioni del vendor, si raccomanda di aggiornare i prodotti vulnerabili seguendo le indicazioni del bollettinio di sicurezza riportato nella sezione Riferimenti.
CVE (1)
Cerca:
| CVE | POC | EXPLOITATION |
| --- | --- | --- |
| CVE-2026-33791 | - | - |
Riferimenti (1)
Change log
| Versione | Note | Data |
|---|---|---|
| 1.0 | Pubblicato il 23-04-2026 | 23/04/2026 |
Impatto sistemico
Medio (64.61)
Argomenti
Data pubblicazione
23/04/26 ore 16:14
Data Ultimo Aggiornamento
23/04/26 ore 16:14
Related changes
Get daily alerts for Italy ACN News alt
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from ACN.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when Italy ACN News alt publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.