Lucene search

K
cveGitHub_MCVE-2023-42818
HistorySep 27, 2023 - 9:15 p.m.

CVE-2023-42818

2023-09-2721:15:10
CWE-287
CWE-307
GitHub_M
web.nvd.nist.gov
27
nvd
cve-2023-42818
jumpserver
koko ssh
mfa
bypass
vulnerability
upgrade

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

46.7%

JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
fit2cloudjumpserverRange<3.5.6
OR
fit2cloudjumpserverRange3.6.03.6.5
VendorProductVersionCPE
fit2cloudjumpserver*cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jumpserver",
    "product": "jumpserver",
    "versions": [
      {
        "version": ">= 3.6.0, < 3.6.5",
        "status": "affected"
      },
      {
        "version": "< 3.5.6",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.001

Percentile

46.7%

Related for CVE-2023-42818