🔐 CVE Alert

CVE-2023-36851

MEDIUM 5.3 ⚠️ CISA KEV

Junos OS: SRX Series: A vulnerability in J-Web allows an unauthenticated attacker to upload and download arbitrary files

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload and download arbitrary files via J-Web, leading to a loss of integrity or confidentiality, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 21.2 versions prior to 21.2R3-S8; * 21.4 versions prior to 21.4R3-S6; * 22.1 versions prior to 22.1R3-S5; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S2; * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2.

CWE CWE-306
Vendor juniper networks
Product junos os
Published Sep 26, 2023
Last Updated Oct 21, 2025
⚠️ Actively Exploited — Act Now

Get instant alerts for juniper networks junos os

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-36851.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

Juniper Networks / Junos OS
21.2 < 21.2R3-S8 21.4 < 21.4R3-S6 22.1 < 22.1R3-S5 22.2 < 22.2R3-S3 22.3 < 22.3R3-S2 22.4 < 22.4R2-S2, 22.4R3 23.2 < 23.2R1-S2, 23.2R2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
supportportal.juniper.net: https://supportportal.juniper.net/JSA72300 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36851

Credits

The Juniper SIRT would like to acknowledge and thank watchtowr for responsibly reporting this vulnerability.