Forum Discussion
Exploit Chain Targets Unpatched Juniper EX Switches and SRX...
Exploit Chain Targets Unpatched Juniper EX Switches and SRX Firewalls
On August 17, Juniper Networks released an out-of-cycle security bulletin addressing four vulnerabilities impacting the J-Web component in Junos OS on SRX series and EX Series devices. While each of the CVE’s on their own received relatively low CVSSv3 scores, chaining these vulnerabilities could result in a remote, unauthenticated attacker being able to execute code on affected devices. Juniper has scored the overall chain of vulnerabilities with a CVSSv3 score of 9.8 and recommends patching as soon as possible.
The CVE’s are as follows:
- CVE-2023-36844 CVSSv3 : 5.3
- CVE-2023-36845 CVSSv3 : 5.3
- CVE-2023-36846 CVSSv3 : 5.3
- CVE-2023-36847 CVSSv3 : 5.3
Following the release of a public proof-of-concept (PoC) on August 25th, researchers at the Shadowserver Foundation have observed attackers attempting to exploit these vulnerabilities.
We strongly recommend updating affected devices as soon as possible. Tenable has released plugins to identify vulnerable assets. You can use this search link which will be dynamically updated with all Tenable plugin coverage for these CVEs.