CVE-2023-42818

JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*

History

25 Mar 2025, 20:15

Type Values Removed Values Added
References
  • () https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-1-2 -

21 Nov 2024, 08:23

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 21:15

Updated : 2025-03-25 20:15


NVD link : CVE-2023-42818

Mitre link : CVE-2023-42818

CVE.ORG link : CVE-2023-42818


JSON object : View

Products Affected

fit2cloud

  • jumpserver
CWE
CWE-287

Improper Authentication

CWE-307

Improper Restriction of Excessive Authentication Attempts