Insecure Encryption Key Reuse in Jenkins Inbound TCP Agent Protocol/3

Insecure Encryption Key Reuse in Jenkins Inbound TCP Agent Protocol/3

CVE-2020-2099 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

Learn more about our Web Application Penetration Testing UK.