CVE-2023-36846
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to upload unauthorized files to the Juniper Networks Junos OS on SRX Series devices without needing to log in, which can compromise the integrity of the file system. It affects multiple versions of the software, so if you're running an outdated version, you could be at risk.
Technical Description
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Aug 17, 2023
over 2 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
juniper
Product
junos
Related Vulnerabilities
An attacker can exploit a flaw in Juniper's Junos OS to upload and download files without needing to log in, potentially compromising the system's integrity and confidentiality. This vulnerability affects specific versions of the software, allowing unauthorized access if the attacker knows how to make a specific request.
An attacker can upload arbitrary files to the Juniper Networks Junos OS on EX Series devices without needing to log in, which can compromise the integrity of the file system. This vulnerability affects multiple versions of the software, so if you're using an outdated version, you should update immediately to prevent exploitation.