Description
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.

Using a crafted request an attacker is able to modify

certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:



* All versions prior to 20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions

prior to

21.3R3-S5;
* 21.4 versions

prior to

21.4R3-S5;
* 22.1 versions

prior to

22.1R3-S4;
* 22.2 versions

prior to

22.2R3-S2;
* 22.3 versions

prior to 22.3R3-S1;
* 22.4 versions

prior to

22.4R2-S2, 22.4R3;
* 23.2 versions prior to

23.2R1-S1, 23.2R2.
Published: 2023-08-17
Score: 5.3 Medium
EPSS: 94.3% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The following software releases have been updated to resolve this specific issue: 20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases. *Pending Publication


Vendor Workaround

Disable J-Web, or limit access to only trusted hosts.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Oct 2025 23:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Mon, 24 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*

Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
Description A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.

Mon, 03 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-11-13'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Juniper Ex2200 Ex2200-c Ex2200-vc Ex2300 Ex2300-24mp Ex2300-24p Ex2300-24t Ex2300-48mp Ex2300-48p Ex2300-48t Ex2300-c Ex2300m Ex3200 Ex3300 Ex3300-vc Ex3400 Ex4200 Ex4200-vc Ex4300 Ex4300-24p Ex4300-24p-s Ex4300-24t Ex4300-24t-s Ex4300-32f Ex4300-32f-dc Ex4300-32f-s Ex4300-48mp Ex4300-48mp-s Ex4300-48p Ex4300-48p-s Ex4300-48t Ex4300-48t-afi Ex4300-48t-dc Ex4300-48t-dc-afi Ex4300-48t-s Ex4300-48tafi Ex4300-48tdc Ex4300-48tdc-afi Ex4300-mp Ex4300-vc Ex4300m Ex4400 Ex4500 Ex4500-vc Ex4550 Ex4550-vc Ex4550\/vc Ex4600 Ex4600-vc Ex4650 Ex6200 Ex6210 Ex8200 Ex8200-vc Ex8208 Ex8216 Ex9200 Ex9204 Ex9208 Ex9214 Ex9250 Ex9251 Ex9253 Junos
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2025-10-21T23:05:40.828Z

Reserved: 2023-06-27T16:17:25.277Z

Link: CVE-2023-36844

cve-icon Vulnrichment

Updated: 2024-08-02T17:01:09.911Z

cve-icon NVD

Status : Analyzed

Published: 2023-08-17T20:15:10.267

Modified: 2025-10-24T16:44:08.650

Link: CVE-2023-36844

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses