Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36847: CWE-306 Missing Authentication for Critical Function in Juniper Networks Junos OS

0
Medium
VulnerabilityCVE-2023-36847cvecve-2023-36847cwe-306
Published: Thu Aug 17 2023 (08/17/2023, 19:16:53 UTC)
Source: CVE Database V5
Vendor/Project: Juniper Networks
Product: Junos OS

Description

A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:49:16 UTC

Technical Analysis

CVE-2023-36847 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Juniper Networks Junos OS running on EX Series switches. The flaw exists in the J-Web management interface, specifically in the installAppPackage.php endpoint, which does not require authentication. This allows an unauthenticated attacker with network access to upload arbitrary files to the device. The consequence is a loss of integrity in parts of the file system, which could be leveraged to chain additional exploits or cause operational disruptions. The vulnerability spans multiple Junos OS versions, including all versions prior to 20.4R3-S8 and various releases in the 21.x and 22.x series up to 22.4R2-S1 and 22.4R3. The CVSS 3.1 base score is 5.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity loss without direct confidentiality or availability impact. No public exploits have been reported yet, but the potential for file system manipulation makes this a concern for network administrators. Juniper’s EX Series switches are widely used in enterprise and service provider networks, making this vulnerability relevant for critical infrastructure protection.

Potential Impact

For European organizations, exploitation of this vulnerability could compromise the integrity of network infrastructure devices, potentially allowing attackers to upload malicious files that disrupt switch operation or facilitate further attacks such as privilege escalation or persistent backdoors. This could lead to network outages, degraded performance, or unauthorized network control. Critical sectors such as telecommunications, finance, government, and energy that rely on Juniper EX Series switches for core networking could experience operational disruptions and data integrity issues. The lack of authentication requirement and network-based attack vector increase the risk, especially in environments where J-Web interfaces are exposed or insufficiently segmented. Although availability and confidentiality impacts are not directly indicated, the integrity compromise could cascade into broader security incidents. The medium severity rating suggests a moderate but non-trivial risk that requires prompt attention to avoid exploitation.

Mitigation Recommendations

1. Immediately upgrade affected Junos OS versions to the fixed releases specified by Juniper Networks (e.g., 20.4R3-S8 or later, 21.2R3-S6 or later, 22.4R2-S1 or later). 2. Restrict access to the J-Web management interface to trusted networks only, ideally via VPN or dedicated management VLANs. 3. Implement network segmentation and firewall rules to limit exposure of management interfaces to untrusted sources. 4. Monitor network traffic for unusual requests to installAppPackage.php or other suspicious activity targeting the J-Web interface. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 6. Conduct regular audits of device configurations and file system integrity to detect unauthorized changes. 7. Educate network administrators on the risks of exposing management interfaces and enforce strong access controls. 8. Maintain an up-to-date inventory of Juniper EX Series devices and their software versions to prioritize patching efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
juniper
Date Reserved
2023-06-27T16:17:25.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ab247d717aace220c8

Added to database: 10/21/2025, 7:06:19 PM

Last enriched: 10/21/2025, 8:49:16 PM

Last updated: 10/30/2025, 3:31:00 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats