🔐 CVE Alert

CVE-2023-36845

CRITICAL 9.8 ⚠️ CISA KEV

Junos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

CWE CWE-473
Vendor juniper networks
Product junos os
Published Aug 17, 2023
Last Updated Oct 21, 2025
⚠️ Actively Exploited — Act Now

Get instant alerts for juniper networks junos os

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-36845.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Juniper Networks / Junos OS
0 < 20.4R3-S9 21.1 < 21.1* 21.2 < 21.2R3-S7 21.3 < 21.3R3-S5 21.4 < 21.4R3-S5 22.1 < 22.1R3-S4 22.2 < 22.2R3-S2 22.3 < 22.3R2-S2, 22.3R3-S1 22.4 < 22.4R2-S1, 22.4R3 23,2 < 23.2R1-S1, 23.2R2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
supportportal.juniper.net: https://supportportal.juniper.net/JSA72300 packetstormsecurity.com: http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html packetstormsecurity.com: http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36845

Credits

LYS, working with DEVCORE Internship Program