Vulnerability Description
A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kiali | Kiali | < 1.15.1 |
| Redhat | Openshift Service Mesh | 1.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764Issue TrackingMitigationThird Party Advisory
- https://kiali.io/news/security-bulletins/kiali-security-001/ExploitMitigationVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764Issue TrackingMitigationThird Party Advisory
- https://kiali.io/news/security-bulletins/kiali-security-001/ExploitMitigationVendor Advisory
FAQ
What is CVE-2020-1764?
CVE-2020-1764 is a vulnerability with a CVSS score of 8.6 (HIGH). A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signe...
How severe is CVE-2020-1764?
CVE-2020-1764 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-1764?
Check the references section above for vendor advisories and patch information. Affected products include: Kiali Kiali, Redhat Openshift Service Mesh.