Improper Certificate Validation in Octopus Deploy - CVE-2020-16197

 

Improper Certificate Validation in Octopus Deploy - CVE-2020-16197

Published: August 25, 2020 / Updated: December 31, 2025


Vulnerability identifier: #VU46354
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-16197
CWE-ID: CWE-295
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Octopus Deploy
Software vendor:
Octopus Deploy

Description

The vulnerability allows a remote authenticated user to gain access to sensitive information.

An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.


Remediation

Install update from vendor's website.

External links