In an update to the original CVE-2023-36845 and CVE-2023-36846 vulnerabilities, new information has emerged, shedding further light on the critical nature of CVE-2023-36845. While Juniper initially scored this vulnerability as a medium-severity issue, VulnCheck’s research has revealed a startling capability within CVE-2023-36845 to achieve unauthenticated remote code execution (RCE) without the need to create any files on the system. This development significantly escalates the risk associated with this vulnerability.
VulnCheck demonstrates that an attacker can leverage CVE-2023-36845 to execute arbitrary code on Juniper firewalls and EX switches, without leaving any trace on the disk. This method involves manipulating an environment variable and using a setting to force the execution of malicious code. This approach allows for unauthenticated code execution via a clever manipulation of PHP features. What’s particularly concerning is that approximately 80% of internet-facing Juniper devices remain unpatched, making them susceptible to this unauthenticated code execution exploit.
Furthermore, VulnCheck has released a vulnerability scanner to identify firewalls vulnerable to CVE-2023-36845. This new information underscores the urgency for organizations to promptly apply patches and follow best practices in securing their network infrastructure, especially when it comes to critical network components like firewalls. The risk posed by this vulnerability remains substantial, with attackers actively probing for potential targets, emphasizing the critical need for mitigation and proactive security measures within affected organizations.