With a specific request to installAppPackage.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of
integrity
for a certain
part of the file system, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:
* All versions prior to 20.4R3-S8;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions
prior to
21.3R3-S5;
* 21.4 versions
prior to
21.4R3-S4;
* 22.1 versions
prior to
22.1R3-S3;
* 22.2 versions
prior to
22.2R3-S1;
* 22.3 versions
prior to
22.3R2-S2, 22.3R3;
* 22.4 versions
prior to
22.4R2-S1, 22.4R3.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Juniper
Subscribe
|
Ex2200
Subscribe
Ex2200-c
Subscribe
Ex2200-vc
Subscribe
Ex2300
Subscribe
Ex2300-24mp
Subscribe
Ex2300-24p
Subscribe
Ex2300-24t
Subscribe
Ex2300-48mp
Subscribe
Ex2300-48p
Subscribe
Ex2300-48t
Subscribe
Ex2300-c
Subscribe
Ex2300m
Subscribe
Ex3200
Subscribe
Ex3300
Subscribe
Ex3300-vc
Subscribe
Ex3400
Subscribe
Ex4200
Subscribe
Ex4200-vc
Subscribe
Ex4300
Subscribe
Ex4300-24p
Subscribe
Ex4300-24p-s
Subscribe
Ex4300-24t
Subscribe
Ex4300-24t-s
Subscribe
Ex4300-32f
Subscribe
Ex4300-32f-dc
Subscribe
Ex4300-32f-s
Subscribe
Ex4300-48mp
Subscribe
Ex4300-48mp-s
Subscribe
Ex4300-48p
Subscribe
Ex4300-48p-s
Subscribe
Ex4300-48t
Subscribe
Ex4300-48t-afi
Subscribe
Ex4300-48t-dc
Subscribe
Ex4300-48t-dc-afi
Subscribe
Ex4300-48t-s
Subscribe
Ex4300-48tafi
Subscribe
Ex4300-48tdc
Subscribe
Ex4300-48tdc-afi
Subscribe
Ex4300-mp
Subscribe
Ex4300-vc
Subscribe
Ex4300m
Subscribe
Ex4400
Subscribe
Ex4500
Subscribe
Ex4500-vc
Subscribe
Ex4550
Subscribe
Ex4550-vc
Subscribe
Ex4550\/vc
Subscribe
Ex4600
Subscribe
Ex4600-vc
Subscribe
Ex4650
Subscribe
Ex6200
Subscribe
Ex6210
Subscribe
Ex8200
Subscribe
Ex8200-vc
Subscribe
Ex8208
Subscribe
Ex8216
Subscribe
Ex9200
Subscribe
Ex9204
Subscribe
Ex9208
Subscribe
Ex9214
Subscribe
Ex9250
Subscribe
Ex9251
Subscribe
Ex9253
Subscribe
Junos
Subscribe
|
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5*, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3*, 23.2R1, and all subsequent releases. *Pending Publication
Workaround
Disable J-Web, or limit access to only trusted hosts.
Tue, 21 Oct 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-21T23:05:40.988Z
Reserved: 2023-06-27T16:17:25.277Z
Link: CVE-2023-36847
Updated: 2024-08-02T17:01:09.811Z
Status : Analyzed
Published: 2023-08-17T20:15:10.553
Modified: 2025-10-24T16:43:45.763
Link: CVE-2023-36847
No data.
OpenCVE Enrichment
No data.