Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36846: CWE-306 Missing Authentication for Critical Function in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2023-36846cvecve-2023-36846cwe-306
Published: Thu Aug 17 2023 (08/17/2023, 19:18:00 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:48:52 UTC

Technical Analysis

CVE-2023-36846 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Juniper Networks Junos OS running on SRX Series devices. The flaw exists in the J-Web management interface, specifically in the handling of requests to user.php, which does not require authentication. An attacker can send a crafted request to upload arbitrary files to the device's file system, thereby compromising the integrity of certain file system components. This vulnerability affects a broad range of Junos OS versions, including all versions prior to 20.4R3-S8 and multiple subsequent releases up to 22.4, with fixed versions released for each branch. The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it accessible to unauthenticated attackers. Although the CVSS v3.1 base score is 5.3 (medium severity), reflecting no confidentiality or availability impact but a loss of integrity, the ability to upload arbitrary files could enable attackers to further exploit the device, potentially leading to privilege escalation or persistent compromise. No public exploits or active exploitation have been reported yet. The vulnerability highlights the risk of insufficient access controls on critical management functions in network security devices, emphasizing the importance of securing management interfaces and applying timely patches.

Potential Impact

For European organizations, the impact of CVE-2023-36846 can be significant, particularly for those relying on Juniper SRX Series devices for firewalling, VPN, and network security functions. Successful exploitation could allow attackers to upload malicious files, potentially leading to unauthorized code execution, persistence, or lateral movement within the network. This undermines the integrity of the device's file system and could compromise the security posture of the entire network segment protected by the affected device. Critical infrastructure providers, financial institutions, telecommunications companies, and large enterprises in Europe that deploy Juniper SRX devices are at heightened risk. The vulnerability's remote and unauthenticated nature increases the attack surface, especially if the J-Web interface is exposed to untrusted networks or insufficiently segmented internal networks. Although no availability or confidentiality impact is directly indicated, chained exploits could escalate the severity. The medium severity rating suggests a moderate but non-negligible risk that requires prompt attention to avoid potential breaches or service disruptions.

Mitigation Recommendations

1. Immediately apply the latest Juniper Networks patches for Junos OS as specified for each affected version branch (e.g., 20.4R3-S8, 21.2R3-S6, 22.4R2-S1, etc.). 2. Restrict access to the J-Web management interface by limiting it to trusted administrative networks using firewall rules or network segmentation. 3. Disable the J-Web interface if it is not required for operational purposes to reduce the attack surface. 4. Implement strong network access controls and monitoring on management interfaces to detect and block unauthorized access attempts. 5. Regularly audit device configurations and logs for signs of suspicious file uploads or unauthorized changes. 6. Employ multi-factor authentication and role-based access controls for device management where possible to add layers of defense. 7. Conduct vulnerability scanning and penetration testing focused on management interfaces to identify similar weaknesses proactively. 8. Maintain an incident response plan that includes procedures for compromised network devices to quickly isolate and remediate affected systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2023-06-27T16:17:25.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ab247d717aace220c4

Added to database: 10/21/2025, 7:06:19 PM

Last enriched: 10/21/2025, 8:48:52 PM

Last updated: 10/30/2025, 3:30:58 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats