First published: Thu Dec 08 2022(Updated: )
In JetBrains JetBrains Gateway before 2022.3 a client could connect without a valid token if the host consented.
Credit: security@jetbrains.com cve@jetbrains.com
Affected Software | Affected Version | How to fix |
---|---|---|
JetBrains Gateway | <2022.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46829 has a medium severity level due to the potential for unauthorized access without token validation.
To fix CVE-2022-46829, upgrade to version 2022.3 or later of JetBrains Gateway.
The risks of CVE-2022-46829 include unauthorized access to JetBrains Gateway services, which could lead to data exposure.
Users of JetBrains Gateway versions prior to 2022.3 are affected by CVE-2022-46829.
Yes, CVE-2022-46829 can be exploited remotely if a user connects to a host that consents to a connection without proper token verification.