CVE-2023-36847: CWE-306 Missing Authentication for Critical Function in Juniper Networks Junos OS
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
AI Analysis
Technical Summary
CVE-2023-36847 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Juniper Networks Junos OS running on EX Series switches. The flaw exists in the J-Web management interface, specifically in the installAppPackage.php endpoint, which does not require authentication. This allows an unauthenticated attacker with network access to upload arbitrary files to the device. The consequence is a loss of integrity in parts of the file system, which could be leveraged to chain additional exploits or cause operational disruptions. The vulnerability spans multiple Junos OS versions, including all versions prior to 20.4R3-S8 and various releases in the 21.x and 22.x series up to 22.4R2-S1 and 22.4R3. The CVSS 3.1 base score is 5.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity loss without direct confidentiality or availability impact. No public exploits have been reported yet, but the potential for file system manipulation makes this a concern for network administrators. Juniper’s EX Series switches are widely used in enterprise and service provider networks, making this vulnerability relevant for critical infrastructure protection.
Potential Impact
For European organizations, exploitation of this vulnerability could compromise the integrity of network infrastructure devices, potentially allowing attackers to upload malicious files that disrupt switch operation or facilitate further attacks such as privilege escalation or persistent backdoors. This could lead to network outages, degraded performance, or unauthorized network control. Critical sectors such as telecommunications, finance, government, and energy that rely on Juniper EX Series switches for core networking could experience operational disruptions and data integrity issues. The lack of authentication requirement and network-based attack vector increase the risk, especially in environments where J-Web interfaces are exposed or insufficiently segmented. Although availability and confidentiality impacts are not directly indicated, the integrity compromise could cascade into broader security incidents. The medium severity rating suggests a moderate but non-trivial risk that requires prompt attention to avoid exploitation.
Mitigation Recommendations
1. Immediately upgrade affected Junos OS versions to the fixed releases specified by Juniper Networks (e.g., 20.4R3-S8 or later, 21.2R3-S6 or later, 22.4R2-S1 or later). 2. Restrict access to the J-Web management interface to trusted networks only, ideally via VPN or dedicated management VLANs. 3. Implement network segmentation and firewall rules to limit exposure of management interfaces to untrusted sources. 4. Monitor network traffic for unusual requests to installAppPackage.php or other suspicious activity targeting the J-Web interface. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 6. Conduct regular audits of device configurations and file system integrity to detect unauthorized changes. 7. Educate network administrators on the risks of exposing management interfaces and enforce strong access controls. 8. Maintain an up-to-date inventory of Juniper EX Series devices and their software versions to prioritize patching efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2023-36847: CWE-306 Missing Authentication for Critical Function in Juniper Networks Junos OS
Description
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.
AI-Powered Analysis
Technical Analysis
CVE-2023-36847 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Juniper Networks Junos OS running on EX Series switches. The flaw exists in the J-Web management interface, specifically in the installAppPackage.php endpoint, which does not require authentication. This allows an unauthenticated attacker with network access to upload arbitrary files to the device. The consequence is a loss of integrity in parts of the file system, which could be leveraged to chain additional exploits or cause operational disruptions. The vulnerability spans multiple Junos OS versions, including all versions prior to 20.4R3-S8 and various releases in the 21.x and 22.x series up to 22.4R2-S1 and 22.4R3. The CVSS 3.1 base score is 5.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity loss without direct confidentiality or availability impact. No public exploits have been reported yet, but the potential for file system manipulation makes this a concern for network administrators. Juniper’s EX Series switches are widely used in enterprise and service provider networks, making this vulnerability relevant for critical infrastructure protection.
Potential Impact
For European organizations, exploitation of this vulnerability could compromise the integrity of network infrastructure devices, potentially allowing attackers to upload malicious files that disrupt switch operation or facilitate further attacks such as privilege escalation or persistent backdoors. This could lead to network outages, degraded performance, or unauthorized network control. Critical sectors such as telecommunications, finance, government, and energy that rely on Juniper EX Series switches for core networking could experience operational disruptions and data integrity issues. The lack of authentication requirement and network-based attack vector increase the risk, especially in environments where J-Web interfaces are exposed or insufficiently segmented. Although availability and confidentiality impacts are not directly indicated, the integrity compromise could cascade into broader security incidents. The medium severity rating suggests a moderate but non-trivial risk that requires prompt attention to avoid exploitation.
Mitigation Recommendations
1. Immediately upgrade affected Junos OS versions to the fixed releases specified by Juniper Networks (e.g., 20.4R3-S8 or later, 21.2R3-S6 or later, 22.4R2-S1 or later). 2. Restrict access to the J-Web management interface to trusted networks only, ideally via VPN or dedicated management VLANs. 3. Implement network segmentation and firewall rules to limit exposure of management interfaces to untrusted sources. 4. Monitor network traffic for unusual requests to installAppPackage.php or other suspicious activity targeting the J-Web interface. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability once available. 6. Conduct regular audits of device configurations and file system integrity to detect unauthorized changes. 7. Educate network administrators on the risks of exposing management interfaces and enforce strong access controls. 8. Maintain an up-to-date inventory of Juniper EX Series devices and their software versions to prioritize patching efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- juniper
- Date Reserved
- 2023-06-27T16:17:25.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9ab247d717aace220c8
Added to database: 10/21/2025, 7:06:19 PM
Last enriched: 10/21/2025, 8:49:16 PM
Last updated: 10/30/2025, 3:31:00 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.