Vulnerability Details : CVE-2023-42818
JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-42818
- cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
- cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-42818
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-42818
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L |
2.8
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2023-42818
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: security-advisories@github.com (Secondary)
-
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-42818
-
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv
SSH public key login without private key challenge if mfa is enabled. · Advisory · jumpserver/jumpserver · GitHubExploit;Vendor Advisory
Jump to