CVE-2023-36851
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in Juniper's Junos OS to upload and download files without needing to log in, potentially compromising the system's integrity and confidentiality. This vulnerability affects specific versions of the software, allowing unauthorized access if the attacker knows how to make a specific request.
Technical Description
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of integrity or confidentiality, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 21.2 versions prior to 21.2R3-S8; * 21.4 versions prior to 21.4R3-S6; * 22.1 versions prior to 22.1R3-S5; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S2; * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Sep 27, 2023
over 2 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
juniper
Product
junos
Related Vulnerabilities
An attacker can upload arbitrary files to the Juniper Networks Junos OS on EX Series devices without needing to log in, which can compromise the integrity of the file system. This vulnerability affects multiple versions of the software, so if you're using an outdated version, you should update immediately to prevent exploitation.
This vulnerability allows an attacker to upload unauthorized files to the Juniper Networks Junos OS on SRX Series devices without needing to log in, which can compromise the integrity of the file system. It affects multiple versions of the software, so if you're running an outdated version, you could be at risk.