Juniper Networks Junos OS Let Attacker Remotely Execute Code

Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability on Junos OS on SRX and EX Series. An unauthenticated network-based attacker can exploit these vulnerabilities by chaining them.

Junos OS SRX is a firewall that is used to protect remote offices, branches, campuses, or data centers by extending to every point. EX series is a high-performance access and distribution/core-layer device for enterprise branches.

Juniper Networks has released a security advisory for fixing these vulnerabilities.

CVE-2023-36844 & CVE-2023-36845: PHP External Variable Flaw

This vulnerability allows an unauthenticated network-based attacker to control some important environment variables by utilizing a crafted request and modifying the PHP environment variable, leading to integrity loss. The severity for these vulnerabilities is given as 5.3 (Medium).

CVE-2023-36846 & CVE-2023-36847: Missing Authentication Critical Function Flaw

An unauthenticated network-based attacker can cause a limited file system integrity impact, requiring authentication to upload arbitrary files through J-Web, leading to integrity loss on some parts of the file system. The severity for these vulnerabilities is given as 5.3 (Medium)

Affected Products

ProductAffected VersionFixed in Version
Junos OS on SRX SeriesAll versions prior to 20.4R3-S8;21.2 versions prior to 21.2R3-S6;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S5;22.1 versions prior to 22.1R3-S3;22.2 versions prior to 22.2R3-S2;22.3 versions prior to 22.3R2-S2, 22.3R3;22.4 versions prior to 22.4R2-S1, 22.4R3;20.4R3-S8, 21.2R3-S6, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S3, 22.2R3-S2*, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3*, 23.2R1, and all subsequent releases.
Junos OS on EX SeriesAll versions prior to 20.4R3-S8;21.2 versions prior to 21.2R3-S6;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S4;22.1 versions prior to 22.1R3-S3;22.2 versions prior to 22.2R3-S1;22.3 versions prior to 22.3R2-S2, 22.3R3;22.4 versions prior to 22.4R2-S1, 22.4R3.20.4R3-S8, 21.2R3-S6, 21.3R3-S5*, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3*, 23.2R1, and all subsequent releases.

Users of these products are recommended to upgrade to the latest version as per the security advisory released by Juniper Networks in order to prevent these vulnerabilities from getting exploited.

Keep informed about the latest Cyber Security News by following us on GoogleNewsLinkedinTwitter, and Facebook.

Eswar

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network to…

17 hours ago

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking vulnerability…

17 hours ago

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…

2 days ago

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…

2 days ago

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…

2 days ago

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…

2 days ago