Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36844: CWE-473 PHP External Variable Modification in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2023-36844cvecve-2023-36844cwe-473
Published: Thu Aug 17 2023 (08/17/2023, 19:17:47 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:48:21 UTC

Technical Analysis

CVE-2023-36844 is a vulnerability classified under CWE-473 (External Variable Modification) found in the J-Web management interface of Juniper Networks Junos OS running on EX Series switches. The vulnerability arises from improper handling of PHP environment variables, allowing an unauthenticated attacker to send crafted network requests that modify these variables. This external variable modification can cause a partial loss of integrity within the affected system, potentially enabling attackers to chain this vulnerability with others to escalate privileges or execute further attacks. The vulnerability affects a broad range of Junos OS versions, specifically all versions prior to 20.4R3-S9 and multiple subsequent releases up to versions prior to 23.2R2. The attack vector is network-based and does not require authentication or user interaction, increasing the risk of exploitation. However, the CVSS score of 5.3 (medium severity) reflects that the impact is limited to integrity loss without direct confidentiality or availability compromise. No public exploits have been reported yet, but the vulnerability's presence in widely deployed network infrastructure devices makes it a significant concern. The flaw resides in the PHP environment variable handling within the web management interface, which is critical for device configuration and monitoring. Successful exploitation could allow attackers to manipulate device behavior or facilitate further attacks, emphasizing the need for timely patching and monitoring.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network infrastructure relying on Juniper EX Series switches running vulnerable Junos OS versions. The partial integrity loss could allow attackers to alter device configurations or interfere with network management processes, potentially disrupting network operations or enabling lateral movement within corporate networks. While confidentiality and availability impacts are not directly indicated, the ability to chain this vulnerability with others could escalate the threat, leading to more severe consequences such as unauthorized access or denial of service. Critical sectors in Europe, including finance, telecommunications, and government, often depend on Juniper networking equipment, making them potential targets. The unauthenticated, network-based nature of the attack increases the risk of exploitation from both external and internal threat actors. Given the widespread use of Juniper devices in European enterprise and service provider networks, failure to address this vulnerability could lead to compromised network integrity and increased exposure to advanced persistent threats.

Mitigation Recommendations

European organizations should immediately identify all Juniper EX Series devices running affected Junos OS versions through asset inventories and network scans. Applying the latest Junos OS patches that address CVE-2023-36844 is critical; organizations should upgrade to versions at or beyond the fixed releases (e.g., 20.4R3-S9, 21.2R3-S7, 23.2R1-S1, etc.). Until patches are applied, restricting access to the J-Web management interface via network segmentation, firewall rules, or VPNs can reduce exposure. Disabling the J-Web interface if not required or replacing it with CLI-based management can further mitigate risk. Monitoring network traffic for unusual or malformed HTTP requests targeting the J-Web interface may help detect exploitation attempts. Implementing strict access controls and multi-factor authentication for management interfaces, even though this vulnerability does not require authentication, adds defense in depth. Regularly reviewing Juniper security advisories and maintaining up-to-date device firmware will help prevent exploitation of this and related vulnerabilities. Finally, conducting penetration testing and vulnerability assessments focused on network management interfaces can identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2023-06-27T16:17:25.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ab247d717aace220b9

Added to database: 10/21/2025, 7:06:19 PM

Last enriched: 10/21/2025, 8:48:21 PM

Last updated: 10/30/2025, 3:31:01 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats