{
  "document" : {
    "aggregate_severity" : {
      "text" : "hoch"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "Juniper Apstra (ehemals bekannt als AOS) automatisiert alle Aspekte der Rechnzentrums-Netzwerkplanung, des Aufbaus, der Bereitstellung und des Betriebs.\r\nJUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.\r\nDie Switches der QFX-Serie von Juniper sichern und automatisieren Netzwerke in Rechenzentren. \r\nDie Juniper MX-Serie ist eine Produktfamilie von Routern.\r\nSRX Series Services Gateways ist ein Next-Generation Anti-Threat Firewall von Juniper.\r\nJunos Space ist eine Software-Plattform, die eine Reihe von Applikationen für das Netzwerkmanagement beinhaltet.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein Angreifer kann mehrere Schwachstellen in Juniper Apstra, Junos OS, Junos OS Evolved und Junos Space ausnutzen, um erweiterte Berechtigungen – sogar Root-Rechte – zu erlangen, beliebigen Code auszuführen – auch mit erweiterten Berechtigungen –, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, Cross-Site-Scripting-Angriffe durchzuführen oder Daten zu manipulieren.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Sonstiges\n- UNIX",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2026-1022 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1022.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2026-1022 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1022"
    }, {
      "category" : "external",
      "summary" : "Juniper Patchday April 2026 vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/global-search/%40uri#sortCriteria=date%20descending&f-sf_primarysourcename=Knowledge&f-sf_articletype=Security%20Advisories&numberOfResults=100"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Apstra: SSH host key validation vulnerability for managed devices (CVE-2025-13914) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Apstra-SSH-host-key-validation-vulnerability-for-managed-devices-CVE-2025-13914"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - CTP OS: Configuring password requirements does not work which permits the use of weak passwords (CVE-2026-33771) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-CTP-OS-Configuring-password-requirements-does-not-work-which-permits-the-use-of-weak-passwords-CVE-2026-33771"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - JSI Virtual Lightweight Collector: Shell escape allows privilege escalation to root (CVE-2026-21915) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-JSI-Virtual-Lightweight-Collector-Shell-escape-allows-privilege-escalation-to-root-CVE-2026-21915"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting netconf sessions causes management unavailability (CVE-2026-21919) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-high-frequency-of-connecting-and-disconnecting-netconf-sessions-causes-management-unavailability-CVE-2026-21919"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset (CVE-2026-33797) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-attacker-sending-a-specific-genuine-BGP-packet-causes-a-BGP-reset-CVE-2026-33797"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: CVE-2022-24805 resolved in net-SNMP vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-CVE-2022-24805-resolved-in-net-SNMP"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: Execution of crafted CLI commands allows for arbitrary shell injection as root (CVE-2026-33791) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Execution-of-crafted-CLI-commands-allows-for-arbitrary-shell-injection-as-root-CVE-2026-33791"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: In an EVPN-MPLS scenario churn of ESI routes causes a memory leak in l2ald (CVE-2026-33780) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-MPLS-scenario-churn-of-ESI-routes-causes-a-memory-leak-in-l2ald-CVE-2026-33780"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: Specific low privileged CLI command exposes sensitive information (CVE-2026-33776) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-low-privileged-CLI-command-exposes-sensitive-information-CVE-2026-33776"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, a local low privileged user can compromise the system (CVE-2026-33793) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-an-unsigned-Python-op-script-configuration-is-present-a-local-low-privileged-user-can-compromise-the-system-CVE-2026-33793"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS Evolved: Local, authenticated attackers can gain access to FPCs (CVE-2026-33788) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-Local-authenticated-attackers-can-gain-access-to-FPCs-CVE-2026-33788"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specific gRPC queries are received evo-aftman crashes (CVE-2026-33783) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-PTX-Series-If-SRTE-tunnels-provisioned-via-PCEP-are-present-and-specific-gRPC-queries-are-received-evo-aftman-crashes-CVE-2026-33783"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will cause evo-aftmand / evo-pfemand to crash and restart (CVE-2025-59969) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Evolved-QFX5000-Series-and-PTX-Series-An-attacker-sending-crafted-multicast-packets-will-cause-evo-aftmand-evo-pfemand-to-crash-and-restart-CVE-2025-59969"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: A low privileged user can escalate their privileges so that they can login as root (CVE-2026-21916) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-A-low-privileged-user-can-escalate-their-privileges-so-that-they-can-login-as-root-CVE-2026-21916"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: EX Series, QFX Series: If the same egress filter is configured on both an IRB and a physical interface one of those is not applied (CVE-2026-33773) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-EX-Series-QFX-Series-If-the-same-egress-filter-is-configured-on-both-an-IRB-and-a-physical-interface-one-of-those-is-not-applied-CVE-2026-33773"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packets are received, memory leaks and eventually no traffic is passed (CVE-2026-33781) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-EX-Series-QFX-Series-In-a-VXLAN-scenario-when-specific-control-protocol-packets-are-received-memory-leaks-and-eventually-no-traffic-is-passed-CVE-2026-33781"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: MX Series: Firewall filters on lo0. in the default routing instance are not in effect (CVE-2026-33774) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Firewall-filters-on-lo0-non-0-in-the-default-routing-instance-are-not-in-effect-CVE-2026-33774"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: MX Series: In specific DHCPv6 scenarios jdhcpd memory increases continuously with subscriber logouts (CVE-2026-33782) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-In-specific-DHCPv6-scenarios-jdhcpd-memory-increases-continuously-with-subscriber-logouts-CVE-2026-33782"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: MX Series: Mismatch between configured and received packet types causes memory leak in bbe-smgd (CVE-2026-33775) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Mismatch-between-configured-and-received-packet-types-causes-memory-leak-in-bbe-smgd-CVE-2026-33775"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: MX Series: Missing Authorization for specific 'request' CLI commands in a JDM/CSDS scenario (CVE-2026-33785) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-MX-Series-Missing-Authorization-for-specific-request-CLI-commands-in-a-JDM-CSDS-scenario-CVE-2026-33785"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: Privileged local user can gain access to a Linux-based FPC as root (CVE-2025-30650) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-Privileged-local-user-can-gain-access-to-a-Linux-based-FPC-as-root-CVE-2025-30650"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is received kmd/iked crashes (CVE-2026-33778) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-When-a-specifically-malformed-first-ISAKMP-packet-is-received-kmd-iked-crashes-CVE-2026-33778"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 packet will cause the srxpfe process to crash and restart. (CVE-2026-33790) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-In-a-NAT64-configuration-receipt-of-a-specific-malformed-ICMPv6-packet-will-cause-the-srxpfe-process-to-crash-and-restart-CVE-2026-33790"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communication (CVE-2026-33779) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX-Series-Insufficient-certificate-verification-for-device-to-SD-cloud-communication-CVE-2026-33779"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes (CVE-2026-33787) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX1500-SRX4100-SRX4200-SRX4600-When-a-specific-show-command-is-executed-chassisd-crashes-CVE-2026-33787"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos OS: SRX1600, SRX2300, SRX4300: When a specific show command is executed chassisd crashes (CVE-2026-33786) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-OS-SRX1600-SRX2300-SRX4300-When-a-specific-show-command-is-executed-chassisd-crashes-CVE-2026-33786"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - Junos Space: ilpFilter field on nLegacy.jsp is vulnerable to reflected cross-site script injection (CVE-2026-21904) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-Junos-Space-ilpFilter-field-on-nLegacy-jsp-is-vulnerable-to-reflected-cross-site-script-injection-CVE-2026-21904"
    }, {
      "category" : "external",
      "summary" : "Juniper Security Bulletin - vLWC: Default password is not required to be changed which allows unauthorized high-privileged access (CVE-2026-33784) vom 2026-04-08",
      "url" : "https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-vLWC-Default-password-is-not-required-to-be-changed-which-allows-unauthorized-high-privileged-access-CVE-2026-33784"
    } ],
    "source_lang" : "en-US",
    "title" : "Juniper Patchday April 2026: Mehrere Schwachstellen",
    "tracking" : {
      "current_release_date" : "2026-04-09T22:00:00.000+00:00",
      "generator" : {
        "date" : "2026-04-10T07:05:13.126+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.5.0"
        }
      },
      "id" : "WID-SEC-W-2026-1022",
      "initial_release_date" : "2026-04-08T22:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2026-04-08T22:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      }, {
        "date" : "2026-04-09T22:00:00.000+00:00",
        "number" : "2",
        "summary" : "Referenz(en) aufgenommen: EUVD-2026-21088, EUVD-2026-21086, EUVD-2026-21091, EUVD-2026-21090, EUVD-2026-21085, EUVD-2026-21092, EUVD-2026-21080, EUVD-2026-21082, EUVD-2026-21078, EUVD-2026-21077, EUVD-2025-209396, EUVD-2026-21095, EUVD-2026-21206, EUVD-2026-21205, EUVD-2026-21204, EUVD-2026-21203, EUVD-2026-21201, EUVD-2026-21199, EUVD-2026-21197, EUVD-2026-21196, EUVD-2026-21195, EUVD-2025-209397, EUVD-2026-21093, EUVD-2026-21207, EUVD-2026-21193, EUVD-2026-21208"
      } ],
      "status" : "final",
      "version" : "2"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<6.1.1",
          "product" : {
            "name" : "Juniper Apstra <6.1.1",
            "product_id" : "T052563"
          }
        }, {
          "category" : "product_version",
          "name" : "6.1.1",
          "product" : {
            "name" : "Juniper Apstra 6.1.1",
            "product_id" : "T052563-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:juniper:apstra:6.1.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Apstra"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "OS",
          "product" : {
            "name" : "Juniper JUNOS OS",
            "product_id" : "T052565",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:juniper:junos:os"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "OS Evolved",
          "product" : {
            "name" : "Juniper JUNOS OS Evolved",
            "product_id" : "T052566",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:juniper:junos:os_evolved"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "JUNOS"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<24.1R5 Patch V3",
          "product" : {
            "name" : "Juniper Junos Space <24.1R5 Patch V3",
            "product_id" : "T052571"
          }
        }, {
          "category" : "product_version",
          "name" : "24.1R5 Patch V3",
          "product" : {
            "name" : "Juniper Junos Space 24.1R5 Patch V3",
            "product_id" : "T052571-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:juniper:junos_space:24.1r5_patch_v3"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Junos Space"
      }, {
        "category" : "product_name",
        "name" : "Juniper MX Series",
        "product" : {
          "name" : "Juniper MX Series",
          "product_id" : "T052568",
          "product_identification_helper" : {
            "cpe" : "cpe:/h:juniper:mx:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Juniper QFX Series",
        "product" : {
          "name" : "Juniper QFX Series",
          "product_id" : "T052567",
          "product_identification_helper" : {
            "cpe" : "cpe:/h:juniper:qfx:os_evolved"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Juniper SRX Series",
        "product" : {
          "name" : "Juniper SRX Series",
          "product_id" : "T052569",
          "product_identification_helper" : {
            "cpe" : "cpe:/h:juniper:srx_service_gateways:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Juniper"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2022-24805",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2022-24805"
  }, {
    "cve" : "CVE-2025-30650",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-30650"
  }, {
    "cve" : "CVE-2025-59969",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-59969"
  }, {
    "cve" : "CVE-2026-21915",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21915"
  }, {
    "cve" : "CVE-2026-21916",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21916"
  }, {
    "cve" : "CVE-2026-21919",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21919"
  }, {
    "cve" : "CVE-2026-33771",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33771"
  }, {
    "cve" : "CVE-2026-33773",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33773"
  }, {
    "cve" : "CVE-2026-33774",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33774"
  }, {
    "cve" : "CVE-2026-33775",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33775"
  }, {
    "cve" : "CVE-2026-33776",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33776"
  }, {
    "cve" : "CVE-2026-33778",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33778"
  }, {
    "cve" : "CVE-2026-33779",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33779"
  }, {
    "cve" : "CVE-2026-33780",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33780"
  }, {
    "cve" : "CVE-2026-33781",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33781"
  }, {
    "cve" : "CVE-2026-33782",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33782"
  }, {
    "cve" : "CVE-2026-33783",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33783"
  }, {
    "cve" : "CVE-2026-33784",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33784"
  }, {
    "cve" : "CVE-2026-33785",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33785"
  }, {
    "cve" : "CVE-2026-33786",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33786"
  }, {
    "cve" : "CVE-2026-33787",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33787"
  }, {
    "cve" : "CVE-2026-33788",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33788"
  }, {
    "cve" : "CVE-2026-33790",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33790"
  }, {
    "cve" : "CVE-2026-33791",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33791"
  }, {
    "cve" : "CVE-2026-33793",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33793"
  }, {
    "cve" : "CVE-2026-33797",
    "product_status" : {
      "known_affected" : [ "T052568", "T052569", "T052566", "T052567", "T052565" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-33797"
  }, {
    "cve" : "CVE-2026-21904",
    "product_status" : {
      "known_affected" : [ "T052571" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2026-21904"
  }, {
    "cve" : "CVE-2025-13914",
    "product_status" : {
      "known_affected" : [ "T052563" ]
    },
    "release_date" : "2026-04-08T22:00:00.000+00:00",
    "title" : "CVE-2025-13914"
  } ]
}