Security for everyone

CVE-2023-36845 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in Juniper Networks Junos OS affects v. prior to 20.4R3-S9; 21.1 versions 21.1R1 and later; 21.2 versions prior to 21.2R3-S7; 21.3 versions prior to 21.3R3-S5; 21.4 versions prior to 21.4R3-S5; 22.1 versions prior to 22.1R3-S4; 22.2 versions prior to 22.2R3-S2; 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; 22.4 versions prior to 22.4R2-S1, 22.4R3; 23.2 versions prior to 23.2R1-S1, 23.2R2.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2023-36845 Scanner Detail

Juniper Networks Junos OS is an operating system used in EX Series and SRX Series devices. This product is commonly used in enterprise network infrastructures and data centers due to its high performance, scalability, and robust security features. Junos OS allows network administrators to manage their environments using a variety of protocols and tools, including SSH, Telnet, and SNMP.

Recently, a serious vulnerability has been detected in Junos OS that could potentially allow remote code execution. This vulnerability, identified as CVE-2023-36845, enables an unauthenticated attacker to modify the PHP execution environment by setting the variable PHPRC using a crafted request. This can lead to the injection and execution of unauthorized code, putting the system at risk of exploitation.

The consequences of this vulnerability being exploited are dire. An attacker with malicious intent can execute arbitrary commands, causing system instability or unauthorized access. This can lead to data breaches, disruption of services, and sensitive information being stolen. The vulnerability can be particularly damaging in heavily regulated sites such as hospitals, financial institutions, or government buildings.

At, we are committed to helping businesses and individuals protect their digital assets and stay informed on the latest threats and vulnerabilities. Our platform offers pro features such as vulnerability assessments, automated patch management, and 24/7 security monitoring. By leveraging our expertise and technology, users can quickly identify and address any security issues in their networks and devices, minimizing the risk of exploitation. Don't wait until it's too late, sign up today and keep your data safe!



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture