Jenkins Amazon EC2 Plugin Vulnerability Exposes Users to Man-in-the-Middle Attacks
CVE-2020-2185

5.6MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
6 May 2020

What is CVE-2020-2185?

The Amazon EC2 Plugin for Jenkins versions 1.50.1 and earlier fails to properly validate SSH host keys when establishing connections with agents. This oversight creates a significant security risk, allowing potential attackers to execute man-in-the-middle attacks. By intercepting communications, malicious actors can tamper with or eavesdrop on data exchanged between Jenkins and EC2 instances, jeopardizing sensitive information and operational integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Amazon EC2 Plugin <= 1.50.1

References

CVSS V3.1

Score:
5.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.