ID:3482 - Exploit for Use of Hard-coded Cryptographic Key in Kiali - CVE-2020-1764

 
Main Vulnerability Database Exploits ID:3482 - Exploit for Use of Hard-coded Cryptographic Key in Kiali - CVE-2020-1764

ID:3482 - Exploit for Use of Hard-coded Cryptographic Key in Kiali - CVE-2020-1764

Published: July 15, 2020


Vulnerability identifier: #VU27380
Vulnerability risk: High
CVE-ID: CVE-2020-1764
CWE-ID: CWE-321
Exploitation vector: Remote access
Vulnerable software:
Kiali

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to gain unauthorized access to the system.

The vulnerability exists due to presence of a hard-coded cryptographic key in the default configuration file. A remote attacker can create their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.


Remediation

Install updates from vendor's website.