CVE-2026-33793 – Juniper Networks Junos OS – Multiple High-Severity Vulnerabilities

CVSS 7.8 IMPORTANT

“Multiple cracks in the network core can quickly turn into a full loss of control.”

This patch addresses several high-severity vulnerabilities in Juniper Networks Junos OS that could allow attackers to escalate privileges across affected network devices. These issues impact core routing and switching systems, increasing the risk of unauthorized access and potential disruption of critical network operations.

CVE-2026-33785 has a CVSS score of 8.8, which is High severity. CVE-2026-21916 has a CVSS score of 7.3, which is High severity. CVE-2026-33790 has a CVSS score of 7.5, which is High severity. CVE-2026-33793 has a CVSS score of 7.8, which is High severity. CVE-2026-33797 has a CVSS score of 7.4, which is High severity. Collectively, these vulnerabilities present a broad attack surface across Junos OS deployments, particularly in environments where network infrastructure is exposed or highly interconnected.

No verified exploitation or public proof-of-concept activity has been confirmed for these vulnerabilities.

Key Details

Affected Product
Juniper Junos
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-250
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.