Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-115
Version:
1.0
Affected software:
EX Series: 21.3 versions prior to 21.3R3-S5
EX Series: 21.1 version 21.1R1 and later versions
EX Series: 21.2 versions prior to 21.2R3-S6
EX Series: 21.4 versions prior to 21.4R3-S4
EX Series: 22.1 versions prior to 22.1R3-S3
EX Series: 22.2 versions prior to 22.2R3-S1
EX Series: 22.3 versions prior to 22.3R2-S2, 22.3R3
EX Series: 22.4 versions prior to 22.4R2-S1, 22.4R3
EX Series: All versions prior to 20.4R3-S8
J-Web of Juniper Networks Junos OS on EX Series and SRX Series firewalls and switches
SRX series: 21.4 versions prior to 21.4R3-S5
SRX series: 22.1 versions prior to 22.1R3-S3
SRX series: 21.1 version 21.1R1 and later versions
SRX series: 21.2 versions prior to 21.2R3-S6
SRX series: 21.3 versions prior to 21.3R3-S5
SRX series: 22.2 versions prior to 22.2R3-S2
SRX series: 22.3 versions prior to 22.3R2-S2, 22.3R3
SRX series: 22.4 versions prior to 22.4R2-S1, 22.4R3
SRX series: All versions prior to 20.4R3-S8
Type:
Remote Code Execution (RCE)
CVE/CVSS:
CVE-2023-36844: A PHP External Variable Modification vulnerability
CVE-2023-36845: A PHP External Variable Modification vulnerability
CVE-2023-36846: A Missing Authentication for Critical Function vulnerability
CVE-2023-36847: A Missing Authentication for Critical Function vulnerability
CVE-2023-36851: A Missing Authentication for Critical Function vulnerability
Chaining the listed vulnerabilities results in a combined CVSS 3.1 score of 9.8/10
https://nvd.nist.gov/vuln/detail/CVE-2023-36844
https://nvd.nist.gov/vuln/detail/CVE-2023-36845
https://nvd.nist.gov/vuln/detail/CVE-2023-36846
https://nvd.nist.gov/vuln/detail/CVE-2023-36847
https://nvd.nist.gov/vuln/detail/CVE-2023-36851
Critical remote code execution (RCE) vulnerabilities have been discovered in Juniper SRX and EX firewalls and switches. Combining the vulnerabilities pose a risk with a CVSS score of 9.8.
Several proof-of-concepts (PoC) exist. On the 8th of November, the Juniper SIRT announced they are aware of the vulnerabilities being exploited in the wild. It is therefore crucial to address this issue promptly, as an infected system could be used as part of a botnet or for ransomware attacks.
The vulnerabilities primarily impact the J-Web component of Junos OS and allows unauthenticated remote attackers to execute arbitrary code. Successful exploitation can lead to a compromise of the system, potentially enabling attackers to gain control.
The vulnerabilities have a high impact on all vertices of the CIA triad (Confidentiality, Integrity, Availability).
Firewalls and switches are interesting targets to threat actors, it is recommended that organisations take immediate action to mitigate this risk.
This advisory addresses the following vulnerabilities: CVE-2023-36844, CVE-2023-36845, CVE-2023- 36846, CVE-2023-36847 and CVE-2023-36851. All CVE's listed affect J-Web of Juniper Networks Junos OS on EX Series and SRX Series firewalls and switches.
Attackers may use these vulnerabilities to gain unauthorized access and control over sensitive network equipment. This flaw can be exploited remotely by attackers without authentication. While we are not aware of any confirmed active exploits at present, several PoCs have been developed that demonstrate the exploitability of this vulnerability. And the most recent example from Vulncheck (https://vulncheck.com/blog/juniper-cve-2023-36845) shows how an attacker could compromise the system using a curl command.
Targeted Technology: The vulnerability affects the J-Web component of Junos OS, a widely used operating system in network infrastructure. Attackers may target this technology to gain unauthorized access and control over sensitive network equipment. According to a scan performed by Vulncheck around 80% of internet facing devices are vulnerable.
Threat Actors: While there are no specific threat actors identified, it is easy to understand that firewalls and switches are attractive targets for any threat actor to compromise, as they facilitate entry into protected networks.
Impact on CIA Triad:
Technical details:
These vulnerabilities allow remote attackers to manipulate application behavior. They result from inadequate validation of user-supplied input in J-Web, enabling remote attackers to modify specific PHP environment variables and alter the application's behavior. Successful exploitation of these vulnerabilities can lead to remote code execution.
These vulnerabilities grant remote attackers the ability to compromise the targeted system. The vulnerabilities exist due to missing authentication when uploading files via J-Web. A remote non-authenticated attacker can upload a malicious file and execute it on the system. Successful exploitation of the vulnerability may result in system compromise.
To mitigate the risks associated with these vulnerabilities, the Centre for Cyber Security Belgium strongly recommends system administrators to take the following actions:
https://vulncheck.com/blog/juniper-cve-2023-36845
https://labs.watchtowr.com/cve-2023-36844-and-friends-rce-in-juniper-firewalls/