CVE-2023-36845: CWE-473 PHP External Variable Modification in Juniper Networks Junos OS
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
AI Analysis
Technical Summary
CVE-2023-36845 is a critical security vulnerability classified under CWE-473 (External Variable Modification) affecting the J-Web management interface of Juniper Networks Junos OS running on EX and SRX Series devices. The vulnerability arises from improper handling of the PHPRC environment variable within the PHP runtime environment used by J-Web. An unauthenticated attacker can send a specially crafted network request that sets the PHPRC variable, thereby modifying the PHP execution environment. This manipulation enables the attacker to inject and execute arbitrary code remotely without any authentication or user interaction. The vulnerability impacts a broad range of Junos OS versions, including all versions prior to 20.4R3-S9 and various subsequent releases up to versions prior to 23.2R2. The flaw allows attackers to gain full control over the affected device, compromising confidentiality, integrity, and availability of the network infrastructure. Given the critical nature of Juniper EX and SRX Series devices in enterprise and service provider networks, exploitation could lead to severe operational disruptions, data breaches, and lateral movement within networks. Although no public exploits have been reported yet, the vulnerability's low attack complexity and high impact necessitate immediate attention from security teams. Juniper has released patches in the specified fixed versions, and organizations are urged to upgrade promptly to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2023-36845 is significant due to the widespread use of Juniper EX and SRX Series devices in enterprise, government, and telecommunications networks across Europe. Successful exploitation could lead to complete compromise of network infrastructure devices, allowing attackers to intercept, modify, or disrupt network traffic, exfiltrate sensitive data, or launch further attacks within the network. This could affect critical sectors such as finance, healthcare, energy, and public administration, potentially causing operational outages and regulatory compliance violations under GDPR and other data protection laws. The vulnerability's ability to be exploited remotely without authentication increases the risk of widespread attacks, including from nation-state actors or cybercriminal groups targeting European networks. Disruption of network availability or integrity could also impact essential services and critical infrastructure, amplifying the threat to national security and economic stability in affected countries.
Mitigation Recommendations
1. Immediately identify all Juniper EX and SRX Series devices running vulnerable Junos OS versions within your network. 2. Apply the official Juniper patches or upgrade to fixed Junos OS versions as listed (e.g., 20.4R3-S9, 21.2R3-S7, 22.3R2-S2, 23.2R1-S1, etc.) to remediate the vulnerability. 3. Restrict network access to the J-Web management interface by implementing strict firewall rules and access control lists, limiting access to trusted administrative networks only. 4. Disable J-Web if not required or replace it with alternative secure management methods such as CLI over SSH with multi-factor authentication. 5. Monitor network traffic and device logs for unusual or unauthorized access attempts targeting the J-Web interface or attempts to manipulate PHP environment variables. 6. Employ network segmentation to isolate critical network infrastructure devices from general user networks to reduce attack surface. 7. Conduct regular vulnerability scans and penetration testing focused on network management interfaces to detect similar weaknesses. 8. Educate network administrators on the risks of exposed management interfaces and enforce strong operational security practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2023-36845: CWE-473 PHP External Variable Modification in Juniper Networks Junos OS
Description
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
AI-Powered Analysis
Technical Analysis
CVE-2023-36845 is a critical security vulnerability classified under CWE-473 (External Variable Modification) affecting the J-Web management interface of Juniper Networks Junos OS running on EX and SRX Series devices. The vulnerability arises from improper handling of the PHPRC environment variable within the PHP runtime environment used by J-Web. An unauthenticated attacker can send a specially crafted network request that sets the PHPRC variable, thereby modifying the PHP execution environment. This manipulation enables the attacker to inject and execute arbitrary code remotely without any authentication or user interaction. The vulnerability impacts a broad range of Junos OS versions, including all versions prior to 20.4R3-S9 and various subsequent releases up to versions prior to 23.2R2. The flaw allows attackers to gain full control over the affected device, compromising confidentiality, integrity, and availability of the network infrastructure. Given the critical nature of Juniper EX and SRX Series devices in enterprise and service provider networks, exploitation could lead to severe operational disruptions, data breaches, and lateral movement within networks. Although no public exploits have been reported yet, the vulnerability's low attack complexity and high impact necessitate immediate attention from security teams. Juniper has released patches in the specified fixed versions, and organizations are urged to upgrade promptly to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2023-36845 is significant due to the widespread use of Juniper EX and SRX Series devices in enterprise, government, and telecommunications networks across Europe. Successful exploitation could lead to complete compromise of network infrastructure devices, allowing attackers to intercept, modify, or disrupt network traffic, exfiltrate sensitive data, or launch further attacks within the network. This could affect critical sectors such as finance, healthcare, energy, and public administration, potentially causing operational outages and regulatory compliance violations under GDPR and other data protection laws. The vulnerability's ability to be exploited remotely without authentication increases the risk of widespread attacks, including from nation-state actors or cybercriminal groups targeting European networks. Disruption of network availability or integrity could also impact essential services and critical infrastructure, amplifying the threat to national security and economic stability in affected countries.
Mitigation Recommendations
1. Immediately identify all Juniper EX and SRX Series devices running vulnerable Junos OS versions within your network. 2. Apply the official Juniper patches or upgrade to fixed Junos OS versions as listed (e.g., 20.4R3-S9, 21.2R3-S7, 22.3R2-S2, 23.2R1-S1, etc.) to remediate the vulnerability. 3. Restrict network access to the J-Web management interface by implementing strict firewall rules and access control lists, limiting access to trusted administrative networks only. 4. Disable J-Web if not required or replace it with alternative secure management methods such as CLI over SSH with multi-factor authentication. 5. Monitor network traffic and device logs for unusual or unauthorized access attempts targeting the J-Web interface or attempts to manipulate PHP environment variables. 6. Employ network segmentation to isolate critical network infrastructure devices from general user networks to reduce attack surface. 7. Conduct regular vulnerability scans and penetration testing focused on network management interfaces to detect similar weaknesses. 8. Educate network administrators on the risks of exposed management interfaces and enforce strong operational security practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2023-06-27T16:17:25.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9ab247d717aace220be
Added to database: 10/21/2025, 7:06:19 PM
Last enriched: 10/21/2025, 8:48:37 PM
Last updated: 10/30/2025, 3:31:01 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.