Monday, October 2, 2023
HomeSecurityHundreds of Juniper gadgets susceptible to unauthenticated RCE flaw

Hundreds of Juniper gadgets susceptible to unauthenticated RCE flaw

An estimated 12,000 Juniper SRX firewalls and EX switches are susceptible to a fileless distant code execution flaw that attackers can exploit with out authentication.

In August, Juniper disclosed quite a few ‘PHP surroundings variant manipulation’ (CVE-2023-36844/CVE-2023-36845) and ‘Lacking Authentication for Essential Operate’ (CVE-2023-36846/CVE-2023-36847) vulnerabilities that by themselves solely had a ‘medium’ severity ranking of 5.3.

Nevertheless, when chained collectively, these vulnerabilities grew to become a crucial distant code execution flaw with a ranking of 9.8.

In a later technical report, watchTowr Labs launched a PoC that chained the CVE-2023-36845 and CVE-2023-36846 flaws, permitting the researchers to remotely execute code by importing two recordsdata to a susceptible system.

Immediately, VulnCheck vulnerability researcher Jacob Baines launched one other PoC exploit that solely makes use of CVE-2023-36845, bypassing the necessity to add recordsdata whereas nonetheless attaining distant code execution.

As a part of Baines’ report, the researcher shared a free scanner on GitHub to assist determine susceptible deployments, exhibiting 1000’s of susceptible gadgets uncovered on the web.

“On this weblog, we demonstrated how CVE-2023-36845, a vulnerability flagged as “Medium” severity by Juniper, can be utilized to remotely execute arbitrary code with out authentication,” explains VulnCheck’s report.

“We have turned a multi-step (however excellent) exploit into an exploit that may be written utilizing a single curl command and seems to have an effect on extra (older) methods.”

The impression of the recognized safety drawback is in depth and rather more extreme than its “medium” CVSS ranking suggests, and admins should take instant motion to remediate the state of affairs.

The brand new exploit

Baines says he bought an outdated Juniper SRX210 firewall for testing the exploit however discovered his system didn’t have the do_fileUpload() performance required to add recordsdata to the system.

This successfully broke watchTowr’s exploit chain, inflicting the researcher to see if there was one other solution to obtain distant code execution.

Baines discovered that you might bypass the necessity to add two recordsdata on the goal servers by manipulating surroundings variables.

The Juniper firewall’s Appweb internet server processes consumer HTTP requests by way of stdin when operating a CGI script.

Exploiting this, attackers can trick the system into recognizing a pseudo “file,”/dev/fd/0, and by adjusting the PHPRC surroundings variable and the HTTP request, they will show delicate information.

Subsequent, VulnCheck harnessed PHP’s ‘auto_prepend_file’ and ‘allow_url_include’ options to run arbitrary PHP code by way of the information:// protocol with out importing any recordsdata.

That stated, the severity ranking of CVE-2023-36845, which is 5.4, ought to now be re-evaluated to a a lot greater crucial rating as a consequence of its potential to attain distant code execution with out some other flaws.

Proof of concept (PoC) curl command
Proof of idea curl command (VulnCheck)

Impression and threat

The CVE-2023-36845 vulnerability impacts the next variations of Junos OS on EX Collection and SRX Collection:

  • All variations earlier than 20.4R3-S8
  • 21.1 model 21.1R1 and later variations
  • 21.2 variations earlier than 21.2R3-S6
  • 21.3 variations earlier than 21.3R3-S5
  • 21.4 variations earlier than 21.4R3-S5
  • 22.1 variations earlier than 22.1R3-S3
  • 22.2 variations earlier than 22.2R3-S2
  • 22.3 variations earlier than 22.3R2-S2, 22.3R3
  • 22.4 variations earlier than 22.4R2-S1, 22.4R3

The seller launched safety updates that addressed the vulnerability on August 17, 2023. Nevertheless, the low severity ranking the flaw obtained did not increase alarms on the impacted customers, a lot of whom might need opted to postpone its software.

VulnCheck’s community scans confirmed 14,951 Juniper with internet-exposed internet interfaces. From a pattern measurement of three,000 gadgets, Baines discovered that 79% had been susceptible to this RCE flaw.

Shodan scan result
Shodan scan consequence (VulnCheck)

If that proportion is utilized to all uncovered gadgets, we could also be 11,800 susceptible gadgets on the web.

Lastly, the report mentions that Shadowserver and GreyNoise have seen attackers probing Junos OS endpoints, so hackers are already exploring the chance to leverage CVE-2023-36845 in assaults.

Due to this fact, Juniper admins should apply these updates as quickly as potential, as they might be used to realize preliminary entry to company networks.



Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

Recent Comments