Vulnerability Description
The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ovh | The-Bastion | < 3.14.15 |
Related Weaknesses (CWE)
References
- https://github.com/ovh/the-bastion/releases/tag/v3.14.15Patch
- https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5xMitigationVendor Advisory
- https://github.com/ovh/the-bastion/releases/tag/v3.14.15Patch
- https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5xMitigationVendor Advisory
FAQ
What is CVE-2023-45140?
CVE-2023-45140 is a vulnerability with a CVSS score of 4.8 (MEDIUM). The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The...
How severe is CVE-2023-45140?
CVE-2023-45140 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45140?
Check the references section above for vendor advisories and patch information. Affected products include: Ovh The-Bastion.