CVE-2023-43652
CVSS 3.1 Score 9.1 of 10 (high)
Details
Summary
CVE-2023-43652 is a vulnerability affecting JumpServer, an open-source bastion host. Unauthenticated users can exploit this issue to authenticate to the core API using an SSH public key without requiring a password or the corresponding private key. Since SSH public keys are publicly available, an attacker can use a leaked public key and username to generate a personal authentication token, granting them access to the affected user's information and authorized actions. This vulnerability has been addressed in versions 2.28.20 and 3.7.1, and users are strongly encouraged to upgrade as soon as possible. There are currently no known workarounds for this issue.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Fit2cloud Jumpserver
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions