#VU27380 Use of Hard-coded Cryptographic Key in Kiali - CVE-2020-1764
Published: April 28, 2020 / Updated: July 15, 2020
Kiali
Kiali
Description
The vulnerability allows a remote attacker to gain unauthorized access to the system.
The vulnerability exists due to presence of a hard-coded cryptographic key in the default configuration file. A remote attacker can create their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.