JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jumpserver
Jumpserver jumpserver |
|
CPEs | cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Jumpserver
Jumpserver jumpserver |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-23T19:02:05.186Z
Reserved: 2023-09-14T16:13:33.309Z
Link: CVE-2023-42818

Updated: 2024-08-02T19:30:24.806Z

Status : Modified
Published: 2023-09-27T21:15:10.173
Modified: 2024-11-21T08:23:16.650
Link: CVE-2023-42818

No data.