Juniper has released an "out-of-cycle" Security Bulletin on a series of vulnerabilities discovered in the J-Web component of the JUNO OS SRX and EX Series which, when chained, can be used by an unauthenticated, network-based attacker to achieve Remote Control Execution (RCE) on the device(s). CVSSv3 scores are noted below for each individual vulnerability, however the chained vulnerability has been assigned a CVSSv3 score of 9.8.
CVE-2023-36844 PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series
CVSSv3: 5.3
CVE-2023-36845 PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series
CVSSv3: 5.3
CVE-2023-36846 Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series
CVSSv3: 5.3
CVE-2023-36847 Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series
CVSSv3: 5.3
Affected Versions
These issues affect Juniper Networks Junos OS on SRX Series:
These issues affect Juniper Networks Junos OS on EX Series:
Mitigations
Per the Juniper Security Bulletin: To prevent remote code execution (RCE), only one PR needs to be fixed per platform.
For EX Series, the following releases have resolved this via PR 1735387:
For SRX Series, the following releases have resolved this via PR 1735389:
Additional Mitigations
Disable J-Web, or limit access to only trusted hosts..