JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
CVE-2023-22644

9.4CRITICAL

Key Information:

Vendor
Suse
Status
Vendor
CVE Published:
20 September 2023

Summary

The vulnerability allows an attacker to reverse engineer the JSON Web Token (JWT) utilized in the authentication process for Manager and API access in NeuVector. By successfully forging a valid NeuVector token, an unauthorized user could engage in harmful activities, potentially leading to remote code execution. This exploitation poses significant risks to the integrity and security of deployment environments that rely on NeuVector.

Affected Version(s)

neuvector 0 < 0.0.0-20231003121714-be746957ee7c

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dejan Zelic at Offensive Security
.