{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Junos OS Evolved versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S6-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 24.2R2 ant\u00e9rieures \u00e0 24.2R2, ","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 25.2 ant\u00e9rieures \u00e0 25.2R1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 24.4R1 ant\u00e9rieures \u00e0 24.4R1-S1-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.4R2 ant\u00e9rieures \u00e0 23.4R2-S6","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 24.4R2 ant\u00e9rieures \u00e0 24.4R2-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 24.2R1 ant\u00e9rieures \u00e0 24.2R1-S2 ","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 25.2 ant\u00e9rieures \u00e0 25.2R1-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-S7-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.2R2 ant\u00e9rieures \u00e0 23.2R2-S4","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 24.4R1 ant\u00e9rieures \u00e0 24.4R1-S2 ou 24.4R2","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4-EVO ","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S7","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 24.2 ant\u00e9rieures \u00e0 24.2R2-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-33793","url":"https://www.cve.org/CVERecord?id=CVE-2026-33793"}],"links":[],"reference":"CERTFR-2026-AVI-0416","revisions":[{"description":"Version initiale","revision_date":"2026-04-10T00:00:00.000000"}],"risks":[{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Juniper Networks. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.","title":"Vuln\u00e9rabilit\u00e9 dans les produits Juniper Networks","vendor_advisories":[{"published_at":"2026-04-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks CVE-2026-33793","url":"https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-an-unsigned-Python-op-script-configuration-is-present-a-local-low-privileged-user-can-compromise-the-system-CVE-2026-33793"}]}
