"VulnCheck's CTO examines CVE-2023-36845, revealing a new path to code execution that doesn't require a file upload and outlining how the vulnerability alone can achieve remote, unauthenticated code execution."

https://vulncheck.com/blog/juniper-cve-2023-36845

#hacking #pentesting #redteam #juniper #cve202336845 #cve_2023_36845

Fileless Remote Code Execution on Juniper Firewalls - Blog - VulnCheck

Learn about VulnCheck's development of an exploit for CVE-2023-36845, leading to stealthy code execution on Juniper firewalls, while also assessing the prevalence of unpatched systems in the wild.

VulnCheck

🚨 🚨 🚨0-Day ALERT🚨 🚨 🚨

Do you have Juniper Firewalls and Switches, Congrats! You have a critical zero-day with a working PoC out!

Here's Github for a scanner to see if you are in trouble:
https://github.com/vulncheck-oss/cve-2023-36845-scanner
I hope this helps!

More Details:
https://www.bleepingcomputer.com/news/security/thousands-of-juniper-devices-vulnerable-to-unauthenticated-rce-flaw/

#junipernetworks #juniper #CVE202336845

GitHub - vulncheck-oss/cve-2023-36845-scanner: A tool to discover Juniper firewalls vulnerable to CVE-2023-36845

A tool to discover Juniper firewalls vulnerable to CVE-2023-36845 - GitHub - vulncheck-oss/cve-2023-36845-scanner: A tool to discover Juniper firewalls vulnerable to CVE-2023-36845

GitHub

"🚨 Juniper Firewalls Under Siege: Over 12,000 Vulnerable Devices Exposed! 🔥"

New research reveals nearly 12,000 internet-facing Juniper firewall devices are susceptible to a recently disclosed remote code execution flaw. The vulnerability, identified as CVE-2023-36845, allows an unauthenticated remote attacker to execute arbitrary code without creating a file on the system. This medium-severity flaw in the J-Web component of Junos OS can be weaponized by adversaries to control certain environment variables. Juniper Networks patched this alongside other vulnerabilities last month. A proof-of-concept (PoC) exploit by watchTowr combined CVE-2023-36846 and CVE-2023-36845 to upload malicious PHP files and achieve code execution. Jacob Baines points out, "Firewalls are interesting targets to APT as they help bridge into the protected network and can serve as useful hosts for C2 infrastructure." Juniper has acknowledged the vulnerability but is unaware of any successful exploits against its customers. However, they've detected exploitation attempts in the wild, urging users to apply necessary patches. 🛡️

Source: The Hacker News

Tags: #Juniper #Firewall #Cybersecurity #Vulnerability #CVE202336845 #RemoteCodeExecution #JunosOS #APT #ThreatLandscape 🌐🔐🔍

Over 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE Vulnerability

Nearly 12,000 Juniper firewall devices exposed on the internet are vulnerable to a recently disclosed remote code execution flaw.

The Hacker News