Description
A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
Published: 2020-03-26
Score: 8.6 High
EPSS: 6.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-0966 A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
Github GHSA Github GHSA GHSA-64rh-r86q-75ff Hard coded cryptographic key in Kiali
History

No history.

Subscriptions

Kiali Kiali
Redhat Openshift Service Mesh Service Mesh
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T06:46:30.916Z

Reserved: 2019-11-27T00:00:00.000Z

Link: CVE-2020-1764

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-26T13:15:13.203

Modified: 2024-11-21T05:11:20.277

Link: CVE-2020-1764

cve-icon Redhat

Severity : Important

Publid Date: 2020-03-25T18:00:00Z

Links: CVE-2020-1764 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses