Lucene search

K
cve[email protected]CVE-2023-42820
HistorySep 27, 2023 - 3:19 p.m.

CVE-2023-42820

2023-09-2715:19:33
CWE-200
web.nvd.nist.gov
2385
In Wild
jumpserver
cve-2023-42820
vulnerability
bastion host
mfa
authentication
upgrade
nvd

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

8.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.7%

JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.

Affected configurations

Vulners
NVD
Node
jumpserverjumpserverRange2.242.28.19
OR
jumpserverjumpserverRange3.0.03.6.5
VendorProductVersionCPE
jumpserverjumpserver*cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*
jumpserverjumpserver*cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jumpserver",
    "product": "jumpserver",
    "versions": [
      {
        "version": ">= 2.24, < 2.28.19",
        "status": "affected"
      },
      {
        "version": ">= 3.0.0, < 3.6.5",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

8.2 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.7%