Jenkins Amazon EC2 Plugin Vulnerability Exposes Users to Man-in-the-Middle Attacks
CVE-2020-2185
5.6MEDIUM
What is CVE-2020-2185?
The Amazon EC2 Plugin for Jenkins versions 1.50.1 and earlier fails to properly validate SSH host keys when establishing connections with agents. This oversight creates a significant security risk, allowing potential attackers to execute man-in-the-middle attacks. By intercepting communications, malicious actors can tamper with or eavesdrop on data exchanged between Jenkins and EC2 instances, jeopardizing sensitive information and operational integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins Amazon EC2 Plugin <= 1.50.1
References
CVSS V3.1
Score:
5.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved