Description

Juniper Networks, a manufacturer of networking hardware, has released an "out-of-cycle" security update to fix several bugs in the J-Web component of the Junos OS that, when combined, might allow remote code execution on vulnerable installations. Users can configure, administer, and keep an eye on Junos OS devices via the J-Web interface.All four vulnerabilities fixed have a combined CVSS rating of 9.8 and impact all Junos OS versions on the SRX and EX Series. The company stated in an advisory published on August 17, 2023, that "by chaining exploitation of these vulnerabilities, an unauthenticated, network-based adversary could potentially be enabled to remotely execute code on the devices." The brief description of the flaws is as follows: CVE-2023-36844 and CVE-2023-36845 are two PHP external variable modification flaws in J-Web from Juniper Networks Junos OS for both the EX Series and the SRX Series that enable an unauthenticated, network-based adversary to control some crucial environment variables. CVE-2023-36846 and CVE-2023-36847 are two missing authentication function flaws in Juniper Networks' Junos OS for the EX Series and SRX Series that enable an unauthenticated, network-based adversary to have a small influence on the integrity of the file system. Threat actors could submit meticulously designed requests to manipulate specific PHP parameters or upload arbitrary files via J-Web without requiring authentication in order to take advantage of the aforementioned weaknesses. Moreover, the vendor fixed all these vulnerabilities by releasing the Junos OS version for both the EX Series and the SRX Series and advising users to apply all necessary fixes. Additionally, Juniper Networks advises customers to disable J-Web or restrict access to just trusted hosts as a remedy.