Juniper Networks Fixes High Severity Junos OS Arbitrary Code Execution Vulnerability
Summary
CSIRT-ITA issued alert AL05/260423/CSIRT-ITA on 23 April 2026 disclosing a high-severity arbitrary code execution vulnerability (CVE-2026-33791) affecting Junos OS and Junos OS Evolved. The vulnerability allows an authenticated attacker with elevated privileges to execute arbitrary code by bypassing security features. Multiple version branches are affected across both product lines, spanning releases from 22.4 through 25.2. CSIRT-ITA recommends applying vendor-provided updates per the Juniper security bulletin.
“Tale vulnerabilità, potrebbe permettere ad un utente malintenzionato con privilegi elevati, di eseguire codice arbitrario eludendo le funzionalità di sicurezza sui sistemi interessati.”
About this source
GovPing monitors Italy CSIRT Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 18 changes logged to date.
What changed
CSIRT-ITA published an alert disclosing CVE-2026-33791, a high-severity vulnerability in Juniper Networks Junos OS and Junos OS Evolved that enables an authenticated attacker with elevated privileges to execute arbitrary code, bypassing system security controls. Affected versions span multiple release tracks from 22.4 through 25.2 across both standard and Evolved product lines, with specific minimum patched versions listed for each branch. CSIRT-ITA references the Juniper security bulletin as the authoritative mitigation source.
Organizations running Juniper Junos OS or Junos OS Evolved should immediately identify whether any of their installations fall within the affected version ranges. Any affected deployments should be updated to the minimum patched version specified for their release track. Given the arbitrary code execution capability and root-level access possible, this vulnerability poses a significant risk to network infrastructure security and should be treated as a priority remediation item.
What to do next
- Update vulnerable Junos OS and Junos OS Evolved installations to patched versions per Juniper security bulletin
Archived snapshot
Apr 25, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Juniper Networks: risolta vulnerabilità in Junos OS e Junos OS Evolved
**
Alert**
AL05/260423/CSIRT-ITA
Condividi
- Facebook
- Twitter
- LinkedIn
- Whatsapp
Sintesi
Juniper Networks ha rilasciato aggiornamenti per risolvere una vulnerabilità con gravità “alta”, nei sistemi operativi Junos OS e Junos OS Evolved. Tale vulnerabilità, potrebbe permettere ad un utente malintenzionato con privilegi elevati, di eseguire codice arbitrario eludendo le funzionalità di sicurezza sui sistemi interessati.
Tipologia
- Arbitrary Code Execution
- Security Feature Bypass
Prodotti e/o versioni affette
Junos OS
- versioni precedenti alla 22.4R3-S8
- 23.2, versioni precedenti alla 23.2R2-S5
- 23.4, versioni precedenti alla 23.4R2-S7
- 24.2, versioni precedenti alla 24.2R2-S2
- 24.4, versioni precedenti alla 24.4R2
25.2, versioni precedenti alla 25.2R2
Junos OS Evolvedversioni precedent alla 22.4R3-S8-EVO
23.2, versioni precedenti alla 23.2R2-S5-EVO
23.4, versioni precedenti alla 23.4R2-S7-EVO
24.2, versioni precedenti alla 24.2R2-S2-EVO
24.4, versioni precedenti alla 24.4R2-EVO
25.2, versioni precedenti alla 25.2R1-S1-EVO, 25.2R2-EVO
Azioni di mitigazione
In linea con le dichiarazioni del vendor, si raccomanda di aggiornare i prodotti vulnerabili seguendo le indicazioni del bollettinio di sicurezza riportato nella sezione Riferimenti.
CVE (1)
Cerca:
| CVE | POC | EXPLOITATION |
| --- | --- | --- |
| CVE-2026-33791 | - | - |
Riferimenti (1)
Change log
| Versione | Note | Data |
|---|---|---|
| 1.0 | Pubblicato il 23-04-2026 | 23/04/2026 |
Impatto sistemico
Medio (64.61)
Argomenti
Data pubblicazione
23/04/26 ore 16:14
Data Ultimo Aggiornamento
23/04/26 ore 16:14
Parties
Related changes
Get daily alerts for Italy CSIRT Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CSIRT-ITA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when Italy CSIRT Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.