CVE-2023-36844 (GCVE-0-2023-36844)

Vulnerability from cvelistv5 – Published: 2023-08-17 19:17 – Updated: 2025-10-21 23:05
VLAI? CISA
Summary
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on EX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2.
CWE
  • CWE-473 - PHP External Variable Modification
Assigner
Impacted products
Vendor Product Version
Juniper Networks Junos OS Affected: 0 , < 20.4R3-S9 (semver)
Affected: 21.1 , < 21.1* (semver)
Affected: 21.2 , < 21.2R3-S6 (semver)
Affected: 21.3 , < 21.3R3-S5 (semver)
Affected: 21.4 , < 21.4R3-S5 (semver)
Affected: 22.1 , < 22.1R3-S4 (semver)
Affected: 22.2 , < 22.2R3-S2 (semver)
Affected: 22.3 , < 22.3R3-S1 (semver)
Affected: 22.4 , < 22.4R2-S2, 22.4R3 (semver)
Affected: 23.2 , < 23.2R1-S1, 23.2R2 (semver)
Create a notification for this product.
Credits
LYS, working with DEVCORE Internship Program
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog

Date added: 2023-11-13

Due date: 2023-11-17

Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Used in ransomware: Unknown

Notes: https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36844

Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:01:09.911Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "mitigation",
              "x_transferred"
            ],
            "url": "https://supportportal.juniper.net/JSA72300"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-36844",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-11-15T16:40:39.936747Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2023-11-13",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:05:40.828Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2023-11-13T00:00:00+00:00",
            "value": "CVE-2023-36844 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "EX Series"
          ],
          "product": "Junos OS",
          "vendor": "Juniper Networks",
          "versions": [
            {
              "lessThan": "20.4R3-S9",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "21.1*",
              "status": "affected",
              "version": "21.1",
              "versionType": "semver"
            },
            {
              "lessThan": "21.2R3-S6",
              "status": "affected",
              "version": "21.2",
              "versionType": "semver"
            },
            {
              "lessThan": "21.3R3-S5",
              "status": "affected",
              "version": "21.3",
              "versionType": "semver"
            },
            {
              "lessThan": "21.4R3-S5",
              "status": "affected",
              "version": "21.4",
              "versionType": "semver"
            },
            {
              "lessThan": "22.1R3-S4",
              "status": "affected",
              "version": "22.1",
              "versionType": "semver"
            },
            {
              "lessThan": "22.2R3-S2",
              "status": "affected",
              "version": "22.2",
              "versionType": "semver"
            },
            {
              "lessThan": "22.3R3-S1",
              "status": "affected",
              "version": "22.3",
              "versionType": "semver"
            },
            {
              "lessThan": "22.4R2-S2, 22.4R3",
              "status": "affected",
              "version": "22.4",
              "versionType": "semver"
            },
            {
              "lessThan": "23.2R1-S1, 23.2R2",
              "status": "affected",
              "version": "23.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe following minimal configuration is necessary:\u003c/p\u003e\u003ccode\u003e\u0026nbsp; [system services web-management http]\u003c/code\u003e\u003cp\u003eor\u003c/p\u003e\u003ccode\u003e\u0026nbsp; [system services web-management https]\u003c/code\u003e\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "The following minimal configuration is necessary:\n\n\u00a0 [system services web-management http]or\n\n\u00a0 [system services web-management https]"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "LYS, working with DEVCORE Internship Program"
        }
      ],
      "datePublic": "2023-08-17T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\u003cbr\u003e\u003cbr\u003eUsing a crafted request an attacker is able to modify \n\ncertain PHP environment variables\u0026nbsp;leading to partial loss of integrity,\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ewhich may allow chaining to other vulnerabilities.\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Juniper Networks Junos OS on EX Series:\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eAll versions prior to 20.4R3-S9;\u003c/li\u003e\u003cli\u003e21.1 versions 21.1R1 and later;\u003c/li\u003e\u003cli\u003e21.2 versions prior to 21.2R3-S7;\u003c/li\u003e\u003cli\u003e21.3 versions \n\nprior to \n\n 21.3R3-S5;\u003c/li\u003e\u003cli\u003e21.4 versions \n\nprior to \n\n21.4R3-S5;\u003c/li\u003e\u003cli\u003e22.1 versions \n\nprior to \n\n22.1R3-S4;\u003c/li\u003e\u003cli\u003e22.2 versions \n\nprior to \n\n22.2R3-S2;\u003c/li\u003e\u003cli\u003e22.3 versions \n\nprior to 22.3R3-S1;\u003c/li\u003e\u003cli\u003e22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3;\u003c/li\u003e\u003cli\u003e23.2 versions prior to \n\n23.2R1-S1, 23.2R2.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e"
            }
          ],
          "value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\n\nUsing a crafted request an attacker is able to modify \n\ncertain PHP environment variables\u00a0leading to partial loss of integrity,\u00a0which may allow chaining to other vulnerabilities.\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n  *  All versions prior to 20.4R3-S9;\n  *  21.1 versions 21.1R1 and later;\n  *  21.2 versions prior to 21.2R3-S7;\n  *  21.3 versions \n\nprior to \n\n 21.3R3-S5;\n  *  21.4 versions \n\nprior to \n\n21.4R3-S5;\n  *  22.1 versions \n\nprior to \n\n22.1R3-S4;\n  *  22.2 versions \n\nprior to \n\n22.2R3-S2;\n  *  22.3 versions \n\nprior to 22.3R3-S1;\n  *  22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3;\n  *  23.2 versions prior to \n\n23.2R1-S1, 23.2R2."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\u003cbr\u003e"
            }
          ],
          "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-473",
              "description": "CWE-473 PHP External Variable Modification",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-02T18:06:16.835Z",
        "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
        "shortName": "juniper"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory",
            "mitigation"
          ],
          "url": "https://supportportal.juniper.net/JSA72300"
        },
        {
          "url": "http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The following software releases have been updated to resolve this specific issue: \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*\u003c/span\u003e, 23.4R1*, and all subsequent releases.\u003cbr\u003e\n\n*Pending Publication\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "The following software releases have been updated to resolve this specific issue: \n\n20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases.\n\n\n*Pending Publication"
        }
      ],
      "source": {
        "defect": [
          "1736937"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Junos OS: EX Series: A PHP vulnerability in J-Web allows an unauthenticated attacker to control important environment variables",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Disable J-Web, or limit access to only trusted hosts.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Disable J-Web, or limit access to only trusted hosts."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
    "assignerShortName": "juniper",
    "cveId": "CVE-2023-36844",
    "datePublished": "2023-08-17T19:17:47.904Z",
    "dateReserved": "2023-06-27T16:17:25.277Z",
    "dateUpdated": "2025-10-21T23:05:40.828Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2023-36844",
      "cwes": "[\"CWE-473\"]",
      "dateAdded": "2023-11-13",
      "dueDate": "2023-11-17",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ;  https://nvd.nist.gov/vuln/detail/CVE-2023-36844",
      "product": "Junos OS",
      "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "shortDescription": "Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities.",
      "vendorProject": "Juniper",
      "vulnerabilityName": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability"
    },
    "fkie_nvd": {
      "cisaActionDue": "2023-11-17",
      "cisaExploitAdd": "2023-11-13",
      "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "cisaVulnerabilityName": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability",
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE3D4F71-8476-4F0D-A976-A308D6483D6D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7BD5636-93D5-4C06-964F-00055DF6B2B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B3302CB-457F-4BD2-B80B-F70FB4C4542E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3A0D9C0-34D3-430F-ABFA-B68010A8825D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E04B126-F290-4242-BB80-5F573D623E6E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"671D9977-7657-48C7-A07C-4AED54380A86\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E100C3C-070D-4132-927F-756538B91491\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2032E7DD-96FD-48B7-922C-5FE04675796C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D907D6A-B7C4-4A10-AA58-0F908575A435\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"979C3597-C53B-4F4B-9EA7-126DA036C86D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A536DA-5A57-4255-AB22-F99F8B7FF62A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C7A20FC-A19F-4881-A0E8-C440E9FE60D0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC326549-217D-4194-8310-AB398D6FF3F0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47DAF5E7-E610-4D74-8573-41C16D642837\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53269C69-3D1E-4F05-8EF6-81743D7A699E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E594D6DC-87F6-40D2-8268-ED6021462168\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"592377CC-4044-4FDD-A3DF-CBF25754EE4D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D12E8275-EF6B-44F9-A7D8-A769CDB5EED5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E63215-246E-49F3-A537-8A90D512DAB0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD1A5E69-928A-41A0-8B9B-91F307D99854\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B71953D-016D-4E72-B598-55667A507681\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CABBC37B-EB93-424D-A1E7-4686039C0955\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24526B69-E3E3-4249-80A4-A886BED5C07E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2209605-65B6-44B3-9700-9EC543BF2408\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3C348CF-65C1-4A53-8F4F-99B5A4113679\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60CB5F91-DC40-4D09-BB93-4539B8581877\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBE3866E-109E-479F-9FFE-3F6E81C0DE7C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A17D793-5F01-4818-956D-D6BC5A6C4CEE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77AF34EC-A154-4042-BE0B-B2BA9EEDEE93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10DC1840-7409-4BD0-9522-B55B1166CF9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9EECCB3-37B3-4146-8F8C-4BBFF84499E9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"303ADB06-5CB5-44DA-8387-39FACC539EF0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDEE8AE4-B393-442C-AD68-4AC43E76A8F3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D842407-7A13-47C7-BBC9-FB0E978221CB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7E98077-92AF-4E3E-96F0-2E6F9D6343D9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4550\\\\/vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3612D798-7A5F-4068-A5A2-92173893450E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1BB20B5-EA30-4E8E-9055-2E629648436A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3ECB975-D1A0-4318-9C5E-752A3C98F76F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B425BB1-3C78-42B1-A6C1-216E514191F0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6CC1C89-B37F-4C5F-9F79-12997C79711D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71FF88C7-89CB-4E04-BADA-AD64F8060C6C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AFE829C-325D-4E66-A6A2-A81BE8BCAB72\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B74B12A6-1CE2-4293-ABA5-E3F23E15485C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72E67A5A-0DFF-42D9-81A7-570E9BCA463D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51C5371-51E9-40AE-8619-BC1267DD1D08\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08A8D94-134A-41E7-8396-70D8B0735E9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E82CE3-F43D-4B29-A64D-B14ADB6CC357\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13C0199E-B9F0-41D3-B625-083990517CDF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8790B456-DFC7-4E82-9A0C-C89787139B79\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CCB1E61-07A1-40B0-B616-F1A6E06D11C4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"079290E9-DCC5-43F7-9480-64874DBF2696\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EA71434-CCBF-4A55-8B30-D213A43E8641\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"20.4\", \"matchCriteriaId\": \"E3A96966-5060-4139-A124-D4E2C879FD6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D361B23-A3C2-444B-BEB8-E231DA950567\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"20DDC6B7-BFC4-4F0B-8E68-442C23765BF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"037BA01C-3F5C-4503-A633-71765E9EF774\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C54B047C-4B38-40C0-9855-067DCF7E48BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"38984199-E332-4A9C-A4C0-78083D052E15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA6526FB-2941-4D18-9B2E-472AD5A62A53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"09876787-A40A-4340-9C12-8628C325353B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"41615104-C17E-44DA-AB0D-6E2053BD4EF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1981DE38-36B5-469D-917E-92717EE3ED53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFA68ACD-AAE5-4577-B734-23AAF77BC85A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*\", \"matchCriteriaId\": \"65948ABC-22BB-46D5-8545-0806EDB4B86E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*\", \"matchCriteriaId\": \"283E41CB-9A90-4521-96DC-F31AA592CFD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*\", \"matchCriteriaId\": \"14EEA504-CBC5-4F6F-889A-D505EC4BB5B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*\", \"matchCriteriaId\": \"977DEF80-0DB5-4828-97AC-09BB3111D585\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*\", \"matchCriteriaId\": \"C445622E-8E57-4990-A71A-E1993BFCB91A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"625BA7E6-D2AD-4A48-9B94-24328BE5B06A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F462F4E3-762C-429F-8D25-5521100DD37C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"689FE1AE-7A85-4FB6-AB02-E732F23581B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"79E56DAC-75AD-4C81-9835-634B40C15DA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0040FE2-7ECD-4755-96CE-E899BA298E0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"076AB086-BB79-4583-AAF7-A5233DFB2F95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"72E2DDF6-01DF-4880-AB60-B3DA3281E88D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"54010163-0810-4CF5-95FE-7E62BC6CA4F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C1C3B09-3800-493E-A319-57648305FE6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"216E7DDE-453D-481F-92E2-9F8466CDDA3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A52AF794-B36B-43A6-82E9-628658624B0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3998DC76-F72F-4452-9150-652140B113EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"36ED4552-2420-45F9-B6E4-6DA2B2B12870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C28A14E7-7EA0-4757-9764-E39A27CFDFA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A43752D-A4AF-4B4E-B95B-192E42883A5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"42986538-E9D0-4C2E-B1C4-A763A4EE451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE22CA01-EA7E-4EE5-B59F-EE100688C1DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E596ABD9-6ECD-48DC-B770-87B7E62EA345\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"71745D02-D226-44DC-91AD-678C85F5E6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"39E44B09-7310-428C-8144-AE9DB0484D1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*\", \"matchCriteriaId\": \"53938295-8999-4316-9DED-88E24D037852\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*\", \"matchCriteriaId\": \"2307BF56-640F-49A8-B060-6ACB0F653A61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*\", \"matchCriteriaId\": \"737DDF96-7B1D-44E2-AD0F-E2F50858B2A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC78A4CB-D617-43FC-BB51-287D2D0C44ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"30FF67F8-1E3C-47A8-8859-709B3614BA6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C7C507E-C85E-4BC6-A3B0-549516BAB524\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6514CDE8-35DC-469F-89A3-078684D18F7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4624565D-8F59-44A8-B7A8-01AD579745E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E08E70-1AF3-4BA5-9A09-06DFE9663ADE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"255B6F20-D32F-42C1-829C-AE9C7923558A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"90AE30DB-C448-4FE9-AC11-FF0F27CDA227\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"93F324AE-65D3-4CFC-AEAB-898CE1BD05CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"79ED3CE8-CC57-43AB-9A26-BBC87816062D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4310D2D9-A8A6-48F8-9384-0A0692A1E1C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9962B01C-C57C-4359-9532-676AB81CE8B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"62178549-B679-4902-BFDB-2993803B7FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AD697DF-9738-4276-94ED-7B9380CD09F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"09FF5818-0803-4646-A386-D7C645EE58A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2229FA59-EB24-49A2-85CE-F529A8DE6BA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CB280D8-C5D8-4B51-A879-496ACCDE4538\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F3F54F1-75B3-400D-A735-2C27C8CEBE79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A5B196A-2AF1-4AE5-9148-A75A572807BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B457616-2D91-4913-9A7D-038BBF8F1F66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F96EBE9-2532-4E35-ABA5-CA68830476A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4D936AE-FD74-4823-A824-2D9F24C25BFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E117E493-F4E1-4568-88E3-F243C74A2662\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"01E3E308-FD9C-4686-8C35-8472A0E99F0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3683A8F5-EE0E-4936-A005-DF7F6B75DED3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B615DBA-8C53-41D4-B264-D3EED8578471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3124DD0-9E42-4896-9060-CB7DD07FC342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"44F6FD6C-03AF-4D2C-B411-A753DE12A2DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D49FFB60-BA71-4902-9404-E67162919ADC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF72FCA-C440-4D43-9BDB-F712DB413717\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E949B21B-AD62-4022-9088-06313277479E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D862E6F-0D01-4B25-8340-888C30F75A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F28F73E-8563-41B9-A313-BBAAD5B57A67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E37D4694-C80B-475E-AB5B-BB431F59C5E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EC0D2D2-4922-4675-8A2C-57A08D7BE334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"591AA3E6-62A2-4A1A-A04C-E808F71D8B6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"786F993E-32CB-492A-A7CC-A7E4F48EA8B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"19519212-51DD-4448-B115-8A20A40192CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CC9909E-AE9F-414D-99B1-83AA04D5297B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDE9E767-4713-4EA2-8D00-1382975A4A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"574730B0-56C8-4A03-867B-1737148ED9B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB4C0FBF-8813-44E5-B71A-22CBAA603E2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E42A41-7965-456B-B0AF-9D3229CE4D4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB1A77D6-D3AD-481B-979C-8F778530B175\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A064B6B-A99B-4D8D-A62D-B00C7870BC30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"40813417-A938-4F74-A419-8C5188A35486\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FC1BA1A-DF0E-4B15-86BA-24C60E546732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B3B2FE1-C228-46BE-AC76-70C2687050AE\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\\n\\nUsing a crafted request an attacker is able to modify \\n\\ncertain PHP environment variables\\u00a0leading to partial loss of integrity,\\u00a0which may allow chaining to other vulnerabilities.\\nThis issue affects Juniper Networks Junos OS on EX Series:\\n\\n\\n\\n  *  All versions prior to 20.4R3-S9;\\n  *  21.1 versions 21.1R1 and later;\\n  *  21.2 versions prior to 21.2R3-S7;\\n  *  21.3 versions \\n\\nprior to \\n\\n 21.3R3-S5;\\n  *  21.4 versions \\n\\nprior to \\n\\n21.4R3-S5;\\n  *  22.1 versions \\n\\nprior to \\n\\n22.1R3-S4;\\n  *  22.2 versions \\n\\nprior to \\n\\n22.2R3-S2;\\n  *  22.3 versions \\n\\nprior to 22.3R3-S1;\\n  *  22.4 versions \\n\\nprior to \\n\\n22.4R2-S2, 22.4R3;\\n  *  23.2 versions prior to \\n\\n23.2R1-S1, 23.2R2.\\n\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de modificaci\\u00f3n de variables externas de PHP en J-Web de Juniper Networks Junos OS en la serie EX permite a un atacante no autenticado basado en red controlar ciertas variables de entorno importantes. Mediante una solicitud falsificada, un atacante puede modificar determinadas variables de entorno de PHP, lo que conduce a una p\\u00e9rdida parcial de la integridad, que puede permitir el encadenamiento con otras vulnerabilidades. Este problema afecta al sistema operativo Junos de Juniper Networks en la serie EX: \\n* Todas las versiones anteriores a 20.4R3-S9; \\n* 21.1: versiones 21.1R1 y posteriores; \\n* 21.2: versiones anteriores a 21.2R3-S7; \\n* 21.3: versiones anteriores a 21.3R3-S5; \\n* 21.4: versiones anteriores a 21.4R3-S5; \\n* 22.1: versiones anteriores a 22.1R3-S4; \\n* 22.2: versiones anteriores a 22.2R3-S2; \\n* 22.3: versiones anteriores a 22.3R3-S1; \\n* 22.4: versiones anteriores a 22.4R2-S2, 22.4R3; \\n* 23.2: versiones anteriores a 23.2R1-S1, 23.2R2.\"}]",
      "id": "CVE-2023-36844",
      "lastModified": "2024-11-21T08:10:43.983",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
      "published": "2023-08-17T20:15:10.267",
      "references": "[{\"url\": \"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://supportportal.juniper.net/JSA72300\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://supportportal.juniper.net/JSA72300\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "sirt@juniper.net",
      "vulnStatus": "Undergoing Analysis",
      "weaknesses": "[{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-473\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-36844\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2023-08-17T20:15:10.267\",\"lastModified\":\"2025-10-24T16:44:08.650\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\\n\\nUsing a crafted request an attacker is able to modify \\n\\ncertain PHP environment variables\u00a0leading to partial loss of integrity,\u00a0which may allow chaining to other vulnerabilities.\\nThis issue affects Juniper Networks Junos OS on EX Series:\\n\\n\\n\\n  *  All versions prior to 20.4R3-S9;\\n  *  21.1 versions 21.1R1 and later;\\n  *  21.2 versions prior to 21.2R3-S7;\\n  *  21.3 versions \\n\\nprior to \\n\\n 21.3R3-S5;\\n  *  21.4 versions \\n\\nprior to \\n\\n21.4R3-S5;\\n  *  22.1 versions \\n\\nprior to \\n\\n22.1R3-S4;\\n  *  22.2 versions \\n\\nprior to \\n\\n22.2R3-S2;\\n  *  22.3 versions \\n\\nprior to 22.3R3-S1;\\n  *  22.4 versions \\n\\nprior to \\n\\n22.4R2-S2, 22.4R3;\\n  *  23.2 versions prior to \\n\\n23.2R1-S1, 23.2R2.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de modificaci\u00f3n de variables externas de PHP en J-Web de Juniper Networks Junos OS en la serie EX permite a un atacante no autenticado basado en red controlar ciertas variables de entorno importantes. Mediante una solicitud falsificada, un atacante puede modificar determinadas variables de entorno de PHP, lo que conduce a una p\u00e9rdida parcial de la integridad, que puede permitir el encadenamiento con otras vulnerabilidades. Este problema afecta al sistema operativo Junos de Juniper Networks en la serie EX: \\n* Todas las versiones anteriores a 20.4R3-S9; \\n* 21.1: versiones 21.1R1 y posteriores; \\n* 21.2: versiones anteriores a 21.2R3-S7; \\n* 21.3: versiones anteriores a 21.3R3-S5; \\n* 21.4: versiones anteriores a 21.4R3-S5; \\n* 22.1: versiones anteriores a 22.1R3-S4; \\n* 22.2: versiones anteriores a 22.2R3-S2; \\n* 22.3: versiones anteriores a 22.3R3-S1; \\n* 22.4: versiones anteriores a 22.4R2-S2, 22.4R3; \\n* 23.2: versiones anteriores a 23.2R1-S1, 23.2R2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"cisaExploitAdd\":\"2023-11-13\",\"cisaActionDue\":\"2023-11-17\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Juniper Junos OS EX Series PHP External Variable Modification Vulnerability\",\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-473\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.4\",\"matchCriteriaId\":\"E3A96966-5060-4139-A124-D4E2C879FD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D361B23-A3C2-444B-BEB8-E231DA950567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DDC6B7-BFC4-4F0B-8E68-442C23765BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"037BA01C-3F5C-4503-A633-71765E9EF774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C54B047C-4B38-40C0-9855-067DCF7E48BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"38984199-E332-4A9C-A4C0-78083D052E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA6526FB-2941-4D18-9B2E-472AD5A62A53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"09876787-A40A-4340-9C12-8628C325353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"41615104-C17E-44DA-AB0D-6E2053BD4EF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1981DE38-36B5-469D-917E-92717EE3ED53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA68ACD-AAE5-4577-B734-23AAF77BC85A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"65948ABC-22BB-46D5-8545-0806EDB4B86E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"283E41CB-9A90-4521-96DC-F31AA592CFD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"14EEA504-CBC5-4F6F-889A-D505EC4BB5B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*\",\"matchCriteriaId\":\"977DEF80-0DB5-4828-97AC-09BB3111D585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C445622E-8E57-4990-A71A-E1993BFCB91A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"625BA7E6-D2AD-4A48-9B94-24328BE5B06A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F462F4E3-762C-429F-8D25-5521100DD37C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"689FE1AE-7A85-4FB6-AB02-E732F23581B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"79E56DAC-75AD-4C81-9835-634B40C15DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0040FE2-7ECD-4755-96CE-E899BA298E0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"076AB086-BB79-4583-AAF7-A5233DFB2F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E2DDF6-01DF-4880-AB60-B3DA3281E88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"54010163-0810-4CF5-95FE-7E62BC6CA4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1C3B09-3800-493E-A319-57648305FE6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"216E7DDE-453D-481F-92E2-9F8466CDDA3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A52AF794-B36B-43A6-82E9-628658624B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3998DC76-F72F-4452-9150-652140B113EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"36ED4552-2420-45F9-B6E4-6DA2B2B12870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28A14E7-7EA0-4757-9764-E39A27CFDFA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A43752D-A4AF-4B4E-B95B-192E42883A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"42986538-E9D0-4C2E-B1C4-A763A4EE451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE22CA01-EA7E-4EE5-B59F-EE100688C1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E596ABD9-6ECD-48DC-B770-87B7E62EA345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"71745D02-D226-44DC-91AD-678C85F5E6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"39E44B09-7310-428C-8144-AE9DB0484D1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53938295-8999-4316-9DED-88E24D037852\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2307BF56-640F-49A8-B060-6ACB0F653A61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"737DDF96-7B1D-44E2-AD0F-E2F50858B2A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC78A4CB-D617-43FC-BB51-287D2D0C44ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30FF67F8-1E3C-47A8-8859-709B3614BA6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C7C507E-C85E-4BC6-A3B0-549516BAB524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6514CDE8-35DC-469F-89A3-078684D18F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4624565D-8F59-44A8-B7A8-01AD579745E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E08E70-1AF3-4BA5-9A09-06DFE9663ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"255B6F20-D32F-42C1-829C-AE9C7923558A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"90AE30DB-C448-4FE9-AC11-FF0F27CDA227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F324AE-65D3-4CFC-AEAB-898CE1BD05CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"79ED3CE8-CC57-43AB-9A26-BBC87816062D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4310D2D9-A8A6-48F8-9384-0A0692A1E1C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9962B01C-C57C-4359-9532-676AB81CE8B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"62178549-B679-4902-BFDB-2993803B7FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD697DF-9738-4276-94ED-7B9380CD09F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09FF5818-0803-4646-A386-D7C645EE58A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2229FA59-EB24-49A2-85CE-F529A8DE6BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB280D8-C5D8-4B51-A879-496ACCDE4538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3F54F1-75B3-400D-A735-2C27C8CEBE79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A5B196A-2AF1-4AE5-9148-A75A572807BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B457616-2D91-4913-9A7D-038BBF8F1F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F96EBE9-2532-4E35-ABA5-CA68830476A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D936AE-FD74-4823-A824-2D9F24C25BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E117E493-F4E1-4568-88E3-F243C74A2662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E3E308-FD9C-4686-8C35-8472A0E99F0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3683A8F5-EE0E-4936-A005-DF7F6B75DED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B615DBA-8C53-41D4-B264-D3EED8578471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3124DD0-9E42-4896-9060-CB7DD07FC342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"44F6FD6C-03AF-4D2C-B411-A753DE12A2DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49FFB60-BA71-4902-9404-E67162919ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF72FCA-C440-4D43-9BDB-F712DB413717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E949B21B-AD62-4022-9088-06313277479E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D862E6F-0D01-4B25-8340-888C30F75A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F28F73E-8563-41B9-A313-BBAAD5B57A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37D4694-C80B-475E-AB5B-BB431F59C5E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC0D2D2-4922-4675-8A2C-57A08D7BE334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"591AA3E6-62A2-4A1A-A04C-E808F71D8B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"786F993E-32CB-492A-A7CC-A7E4F48EA8B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"19519212-51DD-4448-B115-8A20A40192CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC9909E-AE9F-414D-99B1-83AA04D5297B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDE9E767-4713-4EA2-8D00-1382975A4A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"574730B0-56C8-4A03-867B-1737148ED9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4C0FBF-8813-44E5-B71A-22CBAA603E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E42A41-7965-456B-B0AF-9D3229CE4D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1A77D6-D3AD-481B-979C-8F778530B175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A064B6B-A99B-4D8D-A62D-B00C7870BC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"40813417-A938-4F74-A419-8C5188A35486\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3B2FE1-C228-46BE-AC76-70C2687050AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE3D4F71-8476-4F0D-A976-A308D6483D6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7BD5636-93D5-4C06-964F-00055DF6B2B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D066A90D-F7F2-4EA5-8F0C-D0E189DDB05D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B3302CB-457F-4BD2-B80B-F70FB4C4542E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3A0D9C0-34D3-430F-ABFA-B68010A8825D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E04B126-F290-4242-BB80-5F573D623E6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"671D9977-7657-48C7-A07C-4AED54380A86\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E100C3C-070D-4132-927F-756538B91491\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2032E7DD-96FD-48B7-922C-5FE04675796C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D907D6A-B7C4-4A10-AA58-0F908575A435\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979C3597-C53B-4F4B-9EA7-126DA036C86D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A536DA-5A57-4255-AB22-F99F8B7FF62A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7A20FC-A19F-4881-A0E8-C440E9FE60D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC326549-217D-4194-8310-AB398D6FF3F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32B9B26-8BF0-4C56-A9BF-D9BBAEA50506\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DAF5E7-E610-4D74-8573-41C16D642837\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53269C69-3D1E-4F05-8EF6-81743D7A699E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F54ADF-7C13-4AA6-B61E-627D4DBB1CF3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E594D6DC-87F6-40D2-8268-ED6021462168\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"592377CC-4044-4FDD-A3DF-CBF25754EE4D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12E8275-EF6B-44F9-A7D8-A769CDB5EED5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E63215-246E-49F3-A537-8A90D512DAB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1A5E69-928A-41A0-8B9B-91F307D99854\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B71953D-016D-4E72-B598-55667A507681\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CABBC37B-EB93-424D-A1E7-4686039C0955\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24526B69-E3E3-4249-80A4-A886BED5C07E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2209605-65B6-44B3-9700-9EC543BF2408\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C348CF-65C1-4A53-8F4F-99B5A4113679\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CB5F91-DC40-4D09-BB93-4539B8581877\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE3866E-109E-479F-9FFE-3F6E81C0DE7C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A17D793-5F01-4818-956D-D6BC5A6C4CEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77AF34EC-A154-4042-BE0B-B2BA9EEDEE93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9FD3D9F-B49C-48EC-8AE1-FE3B399809DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DC1840-7409-4BD0-9522-B55B1166CF9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EECCB3-37B3-4146-8F8C-4BBFF84499E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303ADB06-5CB5-44DA-8387-39FACC539EF0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F07B0E0B-D2F2-4CF1-A8EA-A1E8DE83BBB4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDEE8AE4-B393-442C-AD68-4AC43E76A8F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D842407-7A13-47C7-BBC9-FB0E978221CB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E98077-92AF-4E3E-96F0-2E6F9D6343D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B84C72A-C314-46FB-8DD8-1DF29C6C4B0D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4550\\\\/vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3612D798-7A5F-4068-A5A2-92173893450E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1BB20B5-EA30-4E8E-9055-2E629648436A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3ECB975-D1A0-4318-9C5E-752A3C98F76F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B425BB1-3C78-42B1-A6C1-216E514191F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CC1C89-B37F-4C5F-9F79-12997C79711D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FF88C7-89CB-4E04-BADA-AD64F8060C6C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AFE829C-325D-4E66-A6A2-A81BE8BCAB72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B74B12A6-1CE2-4293-ABA5-E3F23E15485C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E67A5A-0DFF-42D9-81A7-570E9BCA463D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51C5371-51E9-40AE-8619-BC1267DD1D08\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08A8D94-134A-41E7-8396-70D8B0735E9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E82CE3-F43D-4B29-A64D-B14ADB6CC357\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C0199E-B9F0-41D3-B625-083990517CDF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8790B456-DFC7-4E82-9A0C-C89787139B79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCB1E61-07A1-40B0-B616-F1A6E06D11C4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"079290E9-DCC5-43F7-9480-64874DBF2696\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA71434-CCBF-4A55-8B30-D213A43E8641\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://supportportal.juniper.net/JSA72300\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://supportportal.juniper.net/JSA72300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://supportportal.juniper.net/JSA72300\", \"tags\": [\"vendor-advisory\", \"mitigation\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T17:01:09.911Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-36844\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-11-15T16:40:39.936747Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-11-13\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-11-13T00:00:00+00:00\", \"value\": \"CVE-2023-36844 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36844\", \"tags\": [\"government-resource\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-03T16:29:26.828Z\"}}], \"cna\": {\"title\": \"Junos OS: EX Series: A PHP vulnerability in J-Web allows an unauthenticated attacker to control important environment variables\", \"source\": {\"defect\": [\"1736937\"], \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"LYS, working with DEVCORE Internship Program\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"20.4R3-S9\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.1\", \"lessThan\": \"21.1*\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.2\", \"lessThan\": \"21.2R3-S6\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.3\", \"lessThan\": \"21.3R3-S5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.4\", \"lessThan\": \"21.4R3-S5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.1\", \"lessThan\": \"22.1R3-S4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.2\", \"lessThan\": \"22.2R3-S2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3\", \"lessThan\": \"22.3R3-S1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4R2-S2, 22.4R3\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2\", \"lessThan\": \"23.2R1-S1, 23.2R2\", \"versionType\": \"semver\"}], \"platforms\": [\"EX Series\"], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\u003cbr\u003e\", \"base64\": false}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The following software releases have been updated to resolve this specific issue: \\n\\n20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*, 23.4R1*, and all subsequent releases.\\n\\n\\n*Pending Publication\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The following software releases have been updated to resolve this specific issue: \\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e20.4R3-S9*, 21.2R3-S7*, 21.3R3-S5*, 21.4R3-S5*, 22.1R3-S4*, 22.2R3-S2, 22.3R3-S1*, 22.4R2-S2*, 22.4R3*, 23.2R1-S1, 23.2R2*\u003c/span\u003e, 23.4R1*, and all subsequent releases.\u003cbr\u003e\\n\\n*Pending Publication\\n\\n\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2023-08-17T16:00:00.000Z\", \"references\": [{\"url\": \"https://supportportal.juniper.net/JSA72300\", \"tags\": [\"vendor-advisory\", \"mitigation\"]}, {\"url\": \"http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Disable J-Web, or limit access to only trusted hosts.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Disable J-Web, or limit access to only trusted hosts.\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\\n\\nUsing a crafted request an attacker is able to modify \\n\\ncertain PHP environment variables\\u00a0leading to partial loss of integrity,\\u00a0which may allow chaining to other vulnerabilities.\\nThis issue affects Juniper Networks Junos OS on EX Series:\\n\\n\\n\\n  *  All versions prior to 20.4R3-S9;\\n  *  21.1 versions 21.1R1 and later;\\n  *  21.2 versions prior to 21.2R3-S7;\\n  *  21.3 versions \\n\\nprior to \\n\\n 21.3R3-S5;\\n  *  21.4 versions \\n\\nprior to \\n\\n21.4R3-S5;\\n  *  22.1 versions \\n\\nprior to \\n\\n22.1R3-S4;\\n  *  22.2 versions \\n\\nprior to \\n\\n22.2R3-S2;\\n  *  22.3 versions \\n\\nprior to 22.3R3-S1;\\n  *  22.4 versions \\n\\nprior to \\n\\n22.4R2-S2, 22.4R3;\\n  *  23.2 versions prior to \\n\\n23.2R1-S1, 23.2R2.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.\u003cbr\u003e\u003cbr\u003eUsing a crafted request an attacker is able to modify \\n\\ncertain PHP environment variables\u0026nbsp;leading to partial loss of integrity,\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003ewhich may allow chaining to other vulnerabilities.\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects Juniper Networks Junos OS on EX Series:\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eAll versions prior to 20.4R3-S9;\u003c/li\u003e\u003cli\u003e21.1 versions 21.1R1 and later;\u003c/li\u003e\u003cli\u003e21.2 versions prior to 21.2R3-S7;\u003c/li\u003e\u003cli\u003e21.3 versions \\n\\nprior to \\n\\n 21.3R3-S5;\u003c/li\u003e\u003cli\u003e21.4 versions \\n\\nprior to \\n\\n21.4R3-S5;\u003c/li\u003e\u003cli\u003e22.1 versions \\n\\nprior to \\n\\n22.1R3-S4;\u003c/li\u003e\u003cli\u003e22.2 versions \\n\\nprior to \\n\\n22.2R3-S2;\u003c/li\u003e\u003cli\u003e22.3 versions \\n\\nprior to 22.3R3-S1;\u003c/li\u003e\u003cli\u003e22.4 versions \\n\\nprior to \\n\\n22.4R2-S2, 22.4R3;\u003c/li\u003e\u003cli\u003e23.2 versions prior to \\n\\n23.2R1-S1, 23.2R2.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-473\", \"description\": \"CWE-473 PHP External Variable Modification\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"The following minimal configuration is necessary:\\n\\n\\u00a0 [system services web-management http]or\\n\\n\\u00a0 [system services web-management https]\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe following minimal configuration is necessary:\u003c/p\u003e\u003ccode\u003e\u0026nbsp; [system services web-management http]\u003c/code\u003e\u003cp\u003eor\u003c/p\u003e\u003ccode\u003e\u0026nbsp; [system services web-management https]\u003c/code\u003e\\n\\n\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2023-10-02T18:06:16.835Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-36844\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:05:40.828Z\", \"dateReserved\": \"2023-06-27T16:17:25.277Z\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"datePublished\": \"2023-08-17T19:17:47.904Z\", \"assignerShortName\": \"juniper\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…