JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
References
Configurations
Configuration 1 (hide)
|
History
25 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 08:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 21:15
Updated : 2025-03-25 20:15
NVD link : CVE-2023-42818
Mitre link : CVE-2023-42818
CVE.ORG link : CVE-2023-42818
JSON object : View
Products Affected
fit2cloud
- jumpserver