Facebook Twitter Instagram
    Goobuntu
    • Home
    • Linux
    • Windows
    • Mobile
    • News
    Goobuntu
    Home»News»Hackers Exploiting Juniper RCE Flaw Following PoC Release

    Hackers Exploiting Juniper RCE Flaw Following PoC Release

    0
    By Goobuntu on August 30, 2023 News
    Share
    Facebook Twitter LinkedIn Pinterest Email

    There were multiple vulnerabilities in the Juniper SRX and EX Series, which were reported previously.

    These vulnerabilities have a medium severity if they are separated. However, combining them together results in a pre-auth RCE, which is a critical vulnerability.

    Following their report earlier this month, a PoC (Proof-of-concept) has been released, which provides details on the function flaw, exploitation, and its impact on businesses.

    Nevertheless, reports have stated that several attempts were made to exploit Juniper J-Web ever since the PoC was publicly released.

    Juniper has released patches for fixing these vulnerabilities and also recommended its users patch their devices accordingly in order to prevent external threat actors.

    Since 25th August we are seeing exploitation attempts from multiple IPs for Juniper J-Web CVE-2023-36844 (& friends) targeting /webauth_operation.php endpoint. Same day an exploit POC was published. This involves combining lower severity CVEs to achieve pre-auth RCE. pic.twitter.com/qq0f3oWdnD

    — Shadowserver (@Shadowserver) August 29, 2023

    Juniper released a security advisory for the critical pre-auth RCE in mid-August, which security researchers analyzed at Watchtower Labs.

    In addition to that, they conducted thorough research, which provided a complete insight about the exploitation of this vulnerability and its related vulnerabilities.

    As part of the research, researchers took two specific vulnerabilities (CVE-2023-36846, CVE-2023-36845) that were mentioned in the security bulletin in Juniper. They both relate to a Missing authentication for critical functions and PHP External Variable Modification vulnerability.

    Document

    Get a Demo

    With DoControl, you can keep your SaaS applications and data safe and secure by creating workflows tailored to your needs. It’s an easy and efficient way to identify and manage risks. You can mitigate the risk and exposure of your organization’s SaaS applications in just a few simple steps.

    Further analysis revealed that the J-Web was entirely written in PHP, and a user class manages the authentication. Additionally, a PHP file webauth_operation.php was discovered.

    Furthermore, a total of 150 individual functions were discovered that were used for multiple purposes like simple helpers, formatting IP addresses, and going up to complex functions. All of these functions had interaction with the appliance’s CLI.

    A complete report was published by Watchtwr researchers, which provides detailed information about these vulnerabilities and their exploitation methods.

    A GitHub repository consisting of the Proof-of-concept for this vulnerability has been released, which can be used by security personnel to test and patch their vulnerable environments.

    Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Forever 21 Systems Hacked: 500,000+ Users Affected

    September 1, 2023

    Hackers Exploit Openfire Vulnerability To Deploy Kinsing Malware

    September 1, 2023

    BadBazaar Malware Attacking Users Via Weaponized Apps

    September 1, 2023

    Leave A Reply Cancel Reply

    Popular Posts
    Forever 21 Systems Hacked: 500,000+ Users Affected
    By GoobuntuSeptember 1, 20230
    How to Fix the Action Center Not Opening in Windows
    By GoobuntuSeptember 1, 20230
    Hackers Exploit Openfire Vulnerability To Deploy Kinsing Malware
    By GoobuntuSeptember 1, 20230
    BadBazaar Malware Attacking Users Via Weaponized Apps
    By GoobuntuSeptember 1, 20230
    © 2023 Goobuntu. All Rights Reserved Goobuntu.
    • Contact Us
    • Privacy Policy
    • DMCA
    • Sitemap

    Type above and press Enter to search. Press Esc to cancel.