CVE-2023-36844

Vulnerability updated 4 months ago (2024-05-04T17:41:46.100Z)
Download STIX
Preview STIX
CVE-2023-36844 is a medium-severity vulnerability (CVSS 5.3) in Juniper Networks' Junos OS, specifically impacting EX switches and SRX firewalls. This flaw, along with three others (CVE-2023-36845, CVE-2023-36846, CVE-2023-36847), was addressed by Juniper in mid-August. The details of these vulnerabilities have been made publicly available, raising concerns about potential exploitation. The US Cybersecurity and Infrastructure Security Agency (CISA) has urged organizations to secure their Juniper devices against these vulnerabilities, particularly as they are now being used in remote code execution (RCE) attacks as part of a pre-auth exploit chain. Threat actors have been found actively exploiting these vulnerabilities following the release of a proof-of-concept exploit. This series of vulnerabilities can be used in conjunction to create a critical threat of unauthenticated remote code execution by a network attacker. In response to this threat, Juniper fixed the bug tracked as CVE-2023-36844, along with several others (CVE-2023-36845, CVE-2023-36846, CVE-2023-36847, and CVE-2023-36851) in August. However, given the active exploitation of these vulnerabilities, organizations using Juniper devices are strongly advised to apply these patches immediately if they have not done so already.
Description last updated: 2024-05-04T16:09:49.116Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Juniper
Junos
Exploit
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
CVE-2023-36847Unspecified
3
None
CVE-2023-36846Unspecified
2
CVE-2023-36846 is a significant software vulnerability discovered in Juniper's system, identified as a pre-authentication upload vulnerability. This flaw allows for the uploading of an arbitrary PHP file to a restricted directory with a randomized file name without requiring authentication. The vuln
CVE-2023-36845Unspecified
2
CVE-2023-36845 is a significant software vulnerability, specifically a PHP external variable modification bug, identified by WatchTowr Labs' security researchers. The flaw was part of a series of vulnerabilities linked to the SRX firewall system, including a missing authentication for critical funct
Source Document References
Information about the CVE-2023-36844 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
8 months ago
Juniper warns of critical RCE bug in its firewalls and switches
CERT-EU
10 months ago
Microsoft patches 3 high-severity bugs under active attack
CERT-EU
10 months ago
Four Juniper vulnerabilities added to KEV catalog
CERT-EU
10 months ago
More than 20 Danish energy firms compromised in a large-scale cyberattack
CERT-EU
10 months ago
Juniper networking devices under attack - Help Net Security
Securityaffairs
10 months ago
CISA adds five vulnerabilities in Juniper devices to its Known Exploited Vulnerabilities catalog
CERT-EU
10 months ago
CISA Adds Six Known Exploited Vulnerabilities to Catalog | CISA
CERT-EU
10 months ago
CISA warns of actively exploited Juniper pre-auth RCE exploit chain
CERT-EU
a year ago
Cyber Security Week in Review: September 22, 2023
CERT-EU
a year ago
GovCERT.HK - Security Alerts
Securityaffairs
a year ago
12,000 Juniper SRX firewalls and EX switches vulnerable to CVE-2023-36845
CERT-EU
a year ago
Thousands of Juniper devices vulnerable to unauthenticated RCE flaw
CERT-EU
a year ago
Weekly Vulnerability Recap - Sept 4, 2023 - Network Devices Hit
Checkpoint
a year ago
4th September – Threat Intelligence Report - Check Point Research
Securityaffairs
a year ago
Security Affairs newsletter Round 435 by Pierluigi Paganini
BankInfoSecurity
a year ago
Experts Urge Immediate Juniper Firewall and Switch Patching
CERT-EU
a year ago
This code allow to hack into Juniper SRX firewalls and EX switches
CERT-EU
a year ago
Recent Juniper Flaws Chained in Attacks Following PoC Exploit Publication
Securityaffairs
a year ago
Threat actors started exploiting Juniper flaws shortly after PoC release
CERT-EU
a year ago
Hackers exploit critical Juniper RCE bug chain after PoC release