Wednesday, May 14, 2025
HomeCyber AttackHackers Exploiting Juniper RCE Flaw Following PoC Release

Hackers Exploiting Juniper RCE Flaw Following PoC Release

Published on

SIEM as a Service

Follow Us on Google News

There were multiple vulnerabilities in the Juniper SRX and EX Series, which were reported previously.

These vulnerabilities have a medium severity if they are separated. However, combining them together results in a pre-auth RCE, which is a critical vulnerability.

Following their report earlier this month, a PoC (Proof-of-concept) has been released, which provides details on the function flaw, exploitation, and its impact on businesses.

- Advertisement - Google News

Nevertheless, reports have stated that several attempts were made to exploit Juniper J-Web ever since the PoC was publicly released.

Juniper has released patches for fixing these vulnerabilities and also recommended its users patch their devices accordingly in order to prevent external threat actors.

Proof-of-Concept (PoC): CVE-2023-36844

Juniper released a security advisory for the critical pre-auth RCE in mid-August, which security researchers analyzed at Watchtower Labs.

In addition to that, they conducted thorough research, which provided a complete insight about the exploitation of this vulnerability and its related vulnerabilities.

As part of the research, researchers took two specific vulnerabilities (CVE-2023-36846, CVE-2023-36845) that were mentioned in the security bulletin in Juniper. They both relate to a Missing authentication for critical functions and PHP External Variable Modification vulnerability.

Document
Get a Demo

Start protecting your SaaS data in just a few minutes!

With DoControl, you can keep your SaaS applications and data safe and secure by creating workflows tailored to your needs. It’s an easy and efficient way to identify and manage risks. You can mitigate the risk and exposure of your organization’s SaaS applications in just a few simple steps.

Further analysis revealed that the J-Web was entirely written in PHP, and a user class manages the authentication. Additionally, a PHP file webauth_operation.php was discovered.

Furthermore, a total of 150 individual functions were discovered that were used for multiple purposes like simple helpers, formatting IP addresses, and going up to complex functions. All of these functions had interaction with the appliance’s CLI.

A complete report was published by Watchtwr researchers, which provides detailed information about these vulnerabilities and their exploitation methods.

A GitHub repository consisting of the Proof-of-concept for this vulnerability has been released, which can be used by security personnel to test and patch their vulnerable environments.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical 0-Day in Windows DWM Enables Privilege Escalation

Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager...

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical 0-Day in Windows DWM Enables Privilege Escalation

Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager...

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...