First published: Wed Sep 27 2023(Updated: )
JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Jumpserver | <3.5.6 | |
Fit2cloud Jumpserver | >=3.6.0<3.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42818 is a vulnerability in JumpServer, an open source bastion host, that allows an attacker to perform brute-force authentication when users enable MFA and use a public key for authentication.
CVE-2023-42818 has a severity rating of 9.8 (critical).
CVE-2023-42818 affects Fit2cloud Jumpserver versions up to and including 3.6.5 (inclusive).
An attacker can exploit CVE-2023-42818 by utilizing a disclosed public key to attempt brute-force authentication against the Koko SSH server.
You can find more information about CVE-2023-42818 at https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv.