CVE-2023-44186 – Junos OS and Junos OS Evolved: RPD crash when attempting to send a very long AS PATH to a non-4-byte-AS capable BGP neighbor
https://notcve.org/view.php?id=CVE-2023-44186
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition. This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. This issue affects: Juniper Networks Junos OS: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3. Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S8-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S6-EVO; * 21.3 versions prior to 21.3R3-S5-EVO; * 21.4 versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions prior to 22.2R3-S2-EVO; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO. Una vulnerabilidad de Improper Handling of Exceptional Conditions en el procesamiento AS PATH de Juniper Networks Junos OS y Junos OS Evolved permite a un atacante enviar un mensaje de actualización de BGP con un AS PATH que contiene una gran cantidad de AS de 4 bytes, lo que lleva a una Denegación de Servicio ( DoS). La recepción y el procesamiento continuo de estas actualizaciones de BGP crearán una condición sostenida de Denegación de Servicio (DoS). Este problema se produce cuando el router tiene habilitado Non-Stop Routing (NSR), tiene un vecino BGP que no es de 4 bytes con capacidad AS, recibe un mensaje de actualización de BGP con un prefijo que incluye un AS PATH largo que contiene una gran cantidad de 4 bytes. • https://supportportal.juniper.net/JSA73150 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2023-4481 – Junos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481)
https://notcve.org/view.php?id=CVE-2023-4481
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems. This issue is exploitable remotely as the crafted UPDATE message can propagate through unaffected systems and intermediate BGP speakers. Continuous receipt of the crafted BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session. An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems. This issue is exploitable remotely as the crafted UPDATE message can propagate through unaffected systems and intermediate BGP speakers. Continuous receipt of the crafted BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices. This issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. • https://kb.juniper.net/JSA72510 https://www.juniper.net/documentation/us/en/software/junos/bgp/topics/topic-map/bgp-error-messages.html https://www.rfc-editor.org/rfc/rfc4271 https://www.rfc-editor.org/rfc/rfc7606 • CWE-20: Improper Input Validation •
CVE-2023-36846 – Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
https://notcve.org/view.php?id=CVE-2023-36846
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3. A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1: versions 21.1R1 and later; * 21.2: versions prior to 21.2R3-S6; * 21.3: versions prior to 21.3R3-S5; * 21.4: versions prior to 21.4R3-S5; * 22.1: versions prior to 22.1R3-S3; * 22.2: versions prior to 22.2R3-S2; * 22.3: versions prior to 22.3R2-S2, 22.3R3; * 22.4: versions prior to 22.4R2-S1, 22.4R3. Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. • https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844?ref=labs.watchtowr.com https://github.com/Chocapikk/CVE-2023-36846 https://supportportal.juniper.net/JSA72300 • CWE-306: Missing Authentication for Critical Function •
CVE-2023-36845 – Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability
https://notcve.org/view.php?id=CVE-2023-36845
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. Una vulnerabilidad de modificación de variable externa PHP en J-Web de Juniper Networks Junos OS en las series EX y SRX permite a un atacante no autenticado basado en red ejecutar código de forma remota. Mediante una solicitud manipulada que establece la variable PHPRC, un atacante puede modificar el entorno de ejecución de PHP, lo que permite la inyección y ejecución de código. Este problema afecta al sistema operativo Junos de Juniper Networks en las series EX y SRX: * Todas las versiones anteriores a 20.4R3-S9; * 21.1: versiones 21.1R1 y posteriores; * 21.2: versiones anteriores a 21.2R3-S7; * 21.3: versiones anteriores a 21.3R3-S5; * 21.4: versiones anteriores a 21.4R3-S5; * 22.1: versiones anteriores a 22.1R3-S4; * 22.2: versiones anteriores a 22.2R3-S2; * 22.3: versiones anteriores a 22.3R2-S2, 22.3R3-S1; * 22.4: versiones anteriores a 22.4R2-S1, 22.4R3; * 23.2: versiones anteriores a 23.2R1-S1, 23.2R2. Juniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. • https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844?ref=labs.watchtowr.com https://github.com/cyberh3als/CVE-2023-36845-POC https://github.com/imhunterand/CVE-2023-36845 https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845 https://github.com/kljunowsky/CVE-2023-36845 https://github.com/zaenhaxor/CVE-2023-36845 https://github.com/ak1t4/CVE-2023-36845 https://github.com/halencarjunior/CVE-2023-36845 https://github.com/toanln-cov/CVE-2023-36845 https://github.com • CWE-473: PHP External Variable Modification •
CVE-2023-36844 – Juniper Junos OS EX Series PHP External Variable Modification Vulnerability
https://notcve.org/view.php?id=CVE-2023-36844
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. Una vulnerabilidad de modificación de variables externas de PHP en J-Web de Juniper Networks Junos OS en la serie EX permite a un atacante no autenticado basado en red controlar ciertas variables de entorno importantes. Mediante una solicitud falsificada, un atacante puede modificar determinadas variables de entorno de PHP, lo que conduce a una pérdida parcial de la integridad, que puede permitir el encadenamiento con otras vulnerabilidades. Este problema afecta al sistema operativo Junos de Juniper Networks en la serie EX: * Todas las versiones anteriores a 20.4R3-S9; * 21.1: versiones 21.1R1 y posteriores; * 21.2: versiones anteriores a 21.2R3-S7; * 21.3: versiones anteriores a 21.3R3-S5; * 21.4: versiones anteriores a 21.4R3-S5; * 22.1: versiones anteriores a 22.1R3-S4; * 22.2: versiones anteriores a 22.2R3-S2; * 22.3: versiones anteriores a 22.3R3-S1; * 22.4: versiones anteriores a 22.4R2-S2, 22.4R3; * 23.2: versiones anteriores a 23.2R1-S1, 23.2R2. Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. • https://github.com/watchtowrlabs/juniper-rce_cve-2023-36844?ref=labs.watchtowr.com https://github.com/ThatNotEasy/CVE-2023-36844 http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html https://supportportal.juniper.net/JSA72300 • CWE-473: PHP External Variable Modification •