JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47240 | JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Mar 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 23 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jumpserver
Jumpserver jumpserver |
|
| CPEs | cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jumpserver
Jumpserver jumpserver |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-25T19:28:32.560Z
Reserved: 2023-09-14T16:13:33.309Z
Link: CVE-2023-42818
Updated: 2024-08-02T19:30:24.806Z
Status : Modified
Published: 2023-09-27T21:15:10.173
Modified: 2025-03-25T20:15:19.063
Link: CVE-2023-42818
No data.
OpenCVE Enrichment
No data.
EUVD