CVE Vulnerabilities

CVE-2020-1764

Use of Hard-coded Cryptographic Key

Published: Mar 26, 2020 | Modified: Nov 21, 2024
CVSS 3.x
8.6
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.6 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Affected Software

NameVendorStart VersionEnd Version
KialiKiali*1.15.1 (excluding)
Openshift Service Mesh 1.0RedHatopenshift-service-mesh/kiali-rhel7-operator:1.0.12-2*

Potential Mitigations

References