Networking hardware enterprise Juniper Networks has produced an “out-of-cycle” security update to deal with a number of flaws in the J-Web ingredient of Junos OS that could be blended to attain distant code execution on inclined installations.
The 4 vulnerabilities have a cumulative CVSS ranking of 9.8, producing them Critical in severity. They have an effect on all variations of Junos OS on SRX and EX Collection.
“By chaining exploitation of these vulnerabilities, an unauthenticated, network-based mostly attacker may well be in a position to remotely execute code on the gadgets,” the organization explained in an advisory released on August 17, 2023.
The J-Web interface will allow users to configure, deal with, and watch Junos OS units. A brief description of the flaws is as follows –
- CVE-2023-36844 and CVE-2023-36845 (CVSS scores: 5.3) – Two PHP exterior variable modification vulnerabilities in J-Web of Juniper Networks Junos OS on EX Series and SRX Collection enables an unauthenticated, network-dependent attacker to command particular, significant environments variables.
- CVE-2023-36846 and CVE-2023-36847 (CVSS scores: 5.3) – Two missing authentications for critical perform vulnerabilities in Juniper Networks Junos OS on EX Series and SRX Series allow an unauthenticated, network-based attacker to result in limited effect to the file process integrity.
A threat actor could deliver a specifically crafted request to modify specific PHP setting variables or upload arbitrary data files by using J-Web sans any authentication to correctly exploit the aforementioned issues.
The vulnerabilities have been tackled in the underneath versions –
- EX Sequence – Junos OS versions 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, and 23.2R1
- SRX Collection – Junos OS versions 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, and 23.2R1
End users are advised to utilize the essential fixes to mitigate prospective distant code execution threats. As a workaround, Juniper Networks is suggesting that end users both disable J-Web or restrict obtain to only trustworthy hosts.
Found this posting exciting? Abide by us on Twitter and LinkedIn to study a lot more exclusive content material we publish.
Some parts of this article are sourced from:
thehackernews.com