CVE-2026-33788 PUBLISHED

Junos OS Evolved: Local, authenticated attacker can gain privileged access to FPCs

Assigner: juniper
Reserved: 23.03.2026 Published: 09.04.2026 Updated: 10.04.2026

A Missing Authentication for Critical Function vulnerability in the Flexible PIC Concentrators (FPCs) of Juniper Networks Junos OS Evolved on PTX Series allows a local, authenticated attacker with low privileges to gain direct access to FPCs installed in the device.

A local user with low privileges can gain direct access to the installed FPCs as a high privileged user, which can potentially lead to a full compromise of the affected component.

This issue affects Junos OS Evolved on PTX10004, PTX10008, PTX100016, with JNP10K-LC1201 or JNP10K-LC1202:

  • All versions before 21.2R3-S8-EVO,
  • 21.4-EVO versions before 21.4R3-S7-EVO,
  • 22.2-EVO versions before 22.2R3-S4-EVO,
  • 22.3-EVO versions before 22.3R3-S3-EVO,
  • 22.4-EVO versions before 22.4R3-S2-EVO,
  • 23.2-EVO versions before 23.2R2-EVO.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/AU:Y/R:U/RE:M
CVSS Score: 8.5

Product Status

Vendor Juniper Networks
Product Junos OS Evolved
Versions Default: unaffected
  • affected from 0 to 21.2R3-S8-EVO (excl.)
  • affected from 21.4-EVO to 21.4R3-S7-EVO (excl.)
  • affected from 22.2-EVO to 22.2R3-S4-EVO (excl.)
  • affected from 22.3-EVO to 22.3R3-S3-EVO (excl.)
  • affected from 22.4-EVO to 22.4R3-S2-EVO (excl.)
  • affected from 23.2-EVO to 23.2R2-EVO (excl.)

Exploits

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

Workarounds

Use access lists or firewall filters to limit access to the CLI only from trusted hosts and administrators.

Solutions

The following software releases have been updated to resolve this specific issue: 21.2R3-S8-EVO, 21.4R3-S7-EVO, 22.2R3-S4-EVO, 22.3R3-S3-EVO, 22.4R3-S2-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.

References

Problem Types

  • CWE-306 Missing Authentication for Critical Function CWE