Multiple Junos OS Vulnerabilities Could lead to Unauthenticated Remote Code Execution

Share :

On 17 August 2023, Juniper Networks released out-of-band fixes for multiple vulnerabilities that could be chained together to achieve unauthenticated remote code execution (RCE) on SRX and EX series devices. The vulnerabilities impact the J-Web component of Junos OS, the operating system running on the devices.  

The vulnerabilities were discovered and responsibly disclosed by security researchers during external security research. At this time, we have not observed active exploitation or a public proof of concept published for these vulnerabilities. However, threat actors have historically targeted Juniper products by leveraging a path traversal vulnerability (CVE-2020-1631) in Junos OS, according to CISA’s Known Exploited Vulnerabilities Catalog. Due to the potential for unauthenticated remote code execution and historical targeting of Junos OS, Arctic Wolf strongly recommends upgrading to the latest available fixes for all impacted devices.  

Vulnerability  CVSS Score  Exploitation 
CVE-2023-36844  CVSS: 5.3 – Medium  Not actively exploited 
A PHP External Variable Modification vulnerability in the J-Web component of Junos OS EX series devices that could allow unauthenticated threat actors to control and modify certain PHP environment variables. Can be chained with others to obtain unauthenticated RCE. 
CVE-2023-36845  CVSS: 5.3 – Medium  Not actively exploited 
A PHP External Variable Modification vulnerability in the J-Web component of Junos OS EX and SRX series devices that could allow unauthenticated threat actors to control and modify certain PHP environment variables. Can be chained with others to obtain unauthenticated RCE. 
CVE-2023-36846  CVSS: 5.3 – Medium  Not actively exploited 
A Missing Authentication for Critical Function vulnerability in Junos OS SRX series devices that could allow unauthenticated threat actors to upload arbitrary files via the J-Web component. Can be chained with others to obtain unauthenticated RCE. 
CVE-2023-36847  CVSS: 5.3 – Medium  Not actively exploited 
A Missing Authentication for Critical Function vulnerability in Junos OS EX series devices that could allow unauthenticated threat actors to upload arbitrary files via the J-Web component. Can be chained with others to obtain unauthenticated RCE. 

 

Arctic Wolf is actively monitoring intelligence sources for potential campaigns, indicators of compromise and TTPs associated with these vulnerabilities. 

Recommendation: Apply the Latest Fixes Released by Juniper Networks 

Arctic Wolf strongly recommends reviewing Juniper Networks’ Knowledge Base article to access and apply the relevant fixes. Customer login is required. 

Product  Impacted Versions  Fixed Version 
Junos OS on SRX Series Devices 
  • All versions prior to 20.4R3-S8 
  • 21.2 versions prior to 21.2R3-S6 
  • 21.3 versions prior to 21.3R3-S5 
  • 21.4 versions prior to 21.4R3-S5 
  • 22.1 versions prior to 22.1R3-S3 
  • 22.2 versions prior to 22.2R3-S2 
  • 22.3 versions prior to 22.3R2-S2, 22.3R3 
  • 22.4 versions prior to 22.4R2-S1, 22.4R3 
  • 20.4R3-S8 
  • 21.2R3-S6 
  • 21.3R3-S5 
  • 21.4R3-S5 
  • 22.1R3-S3 
  • 22.2R3-S2 
  • 22.3R2-S2, 22.3R3 
  • 22.4R2-S1, 22.4R3 
Junos OS on EX Series Devices 
  • All versions prior to 20.4R3-S8 
  • 21.2 versions prior to 21.2R3-S6 
  • 21.3 versions prior to 21.3R3-S5 
  • 21.4 versions prior to 21.4R3-S4 
  • 22.1 versions prior to 22.1R3-S3 
  • 22.2 versions prior to 22.2R3-S1 
  • 22.3 versions prior to 22.3R2-S2, 22.3R3 
  • 22.4 versions prior to 22.4R2-S1, 22.4R3 
  • 20.4R3-S8 
  • 21.2R3-S6 
  • 21.3R3-S5 
  • 21.4R3-S4 
  • 22.1R3-S3 
  • 22.2R3-S1 
  • 22.3R2-S2, 22.3R3 
  • 22.4R2-S1, 22.4R3 

 

Please follow your organisation’s patching and testing guidelines to avoid any operational impact. 

Workaround: Disable J-Web Component 

If applying the latest fix is not feasible, we strongly recommend applying Juniper Network’s workaround. Juniper Networks recommends disabling the J-Web component or limiting access to trusted hosts until the fix can be applied.  

References 

 

Picture of Steven Campbell

Steven Campbell

Steven Campbell is a Senior Threat Intelligence Researcher at Arctic Wolf Labs and has more than eight years of experience in intelligence analysis and security research. He has a strong background in infrastructure analysis and adversary tradecraft.
Share :
Table of Contents
Categories