#VU27380 Use of Hard-coded Cryptographic Key in Kiali - CVE-2020-1764

 

#VU27380 Use of Hard-coded Cryptographic Key in Kiali - CVE-2020-1764

Published: April 28, 2020 / Updated: July 15, 2020


Vulnerability identifier: #VU27380
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2020-1764
CWE-ID: CWE-321
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Kiali
Software vendor:
Kiali

Description

The vulnerability allows a remote attacker to gain unauthorized access to the system.

The vulnerability exists due to presence of a hard-coded cryptographic key in the default configuration file. A remote attacker can create their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.


Remediation

Install updates from vendor's website.

External links