Impact
The vulnerability permits a local attacker with low privileges to execute unsigned Python operational scripts that the device accepts without validation. By running such a script, the attacker can achieve root‑equivalent privileges, thereby gaining unrestricted control over the device. The weakness is classified as CWE‑250.
Affected Systems
Impact is limited to Juniper Networks Junos OS and Junos OS Evolved appliances. All releases older than 22.4R3‑S7 for Junos OS, older than 23.2R2‑S4, older than 23.4R2‑S6, older than 24.2R1‑S2/24.2R2, older than 24.4R1‑S2/24.4R2 apply to Junos OS. For Junos OS Evolved, affected releases are all before 22.4R3‑S7‑EVO, before 23.2R2‑S4‑EVO, before 23.4R2‑S6‑EVO, before 24.2R2‑EVO, before 24.4R1‑S1‑EVO/24.4R2‑EVO. Each vendor’s advisory lists the specific update releases that fix the issue.
Risk and Exploitability
The CVSS v3.1 base score is 8.5, indicating high risk. EPSS is unavailable, so the exploitation probability is unclear, but the vulnerability is already recognized by the vendor. It is not listed in the CISA KEV catalog. Because the flaw requires local access to a low‑privileged user account that is already present on the system, the attack vector is local. An attacker could simply initiate the CLI, upload or inject an unsigned script, and then execute it with root privileges, leading to complete compromise of the device.
OpenCVE Enrichment