Upstream information
Description
JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
CNA (GitHub) | National Vulnerability Database | |
---|---|---|
Base Score | 5.4 | 9.8 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | Required | None |
Scope | Unchanged | Unchanged |
Confidentiality Impact | None | High |
Integrity Impact | Low | High |
Availability Impact | Low | High |
CVSSv3 Version | 3.1 | 3.1 |
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2025-15225 |
SUSE Timeline for this CVE
CVE page created: Thu Sep 28 00:00:19 2023CVE page last modified: Fri Jul 4 12:10:19 2025