๐Ÿ” CVE Alert

CVE-2026-21916

HIGH 7.3

Junos OS: A low privileged user can escalate their privileges so that they can login as root

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
2th

A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Networks Junos OS allows a local, authenticated attacker with low privileges to escalate their privileges to root which will lead to a complete compromise of the system. When after a user has performed a specific 'file link ...' CLI operation, another user commits (unrelated configuration changes), the first user can login as root. This issue affects Junos OS: * all versions before 23.2R2-S7, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S3, * 24.4 versions before 24.4R2-S2, * 25.2 versions before 25.2R2. This issue does not affect versions 25.4R1 or later.

CWE CWE-61
Vendor juniper networks
Product junos os
Published Apr 9, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for juniper networks junos os

Be the first to know when new high vulnerabilities affecting juniper networks junos os are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Juniper Networks / Junos OS
0 < 23.2R2-S7 23.4 < 23.4R2-S6 24.2 < 24.2R2-S3 24.4 < 24.4R2-S2 25.2 < 25.2R2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
kb.juniper.net: https://kb.juniper.net/JSA107807