Jenkins Amazon EC2 Plugin Vulnerability Exposes Users to Man-in-the-Middle Attacks
CVE-2020-2185

5.6MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
6 May 2020

Summary

The Amazon EC2 Plugin for Jenkins versions 1.50.1 and earlier fails to properly validate SSH host keys when establishing connections with agents. This oversight creates a significant security risk, allowing potential attackers to execute man-in-the-middle attacks. By intercepting communications, malicious actors can tamper with or eavesdrop on data exchanged between Jenkins and EC2 instances, jeopardizing sensitive information and operational integrity.

Affected Version(s)

Jenkins Amazon EC2 Plugin <= 1.50.1

References

CVSS V3.1

Score:
5.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.