Jenkins Amazon EC2 Plugin Vulnerability Exposes Users to Man-in-the-Middle Attacks
CVE-2020-2185
5.6MEDIUM
Summary
The Amazon EC2 Plugin for Jenkins versions 1.50.1 and earlier fails to properly validate SSH host keys when establishing connections with agents. This oversight creates a significant security risk, allowing potential attackers to execute man-in-the-middle attacks. By intercepting communications, malicious actors can tamper with or eavesdrop on data exchanged between Jenkins and EC2 instances, jeopardizing sensitive information and operational integrity.
Affected Version(s)
Jenkins Amazon EC2 Plugin <= 1.50.1
References
CVSS V3.1
Score:
5.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved