Severity
8.6HIGHNVD
EPSS
0.6%
top 29.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 29
Latest updateMay 24

Description

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:LExploitability: 3.9 | Impact: 4.7

Affected Packages2 packages

NVDjenkins/jenkins2.204.1+1
CVEListV5jenkins_project/jenkinsunspecified2.213+1

🔴Vulnerability Details

3
GHSA
Inbound TCP Agent Protocol/3 authentication bypass in Jenkins2022-05-24
OSV
Inbound TCP Agent Protocol/3 authentication bypass in Jenkins2022-05-24
CVEList
CVE-2020-2099: Jenkins 22020-01-29

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2020-01-292020-01-29
Red Hat
jenkins: Inbound TCP Agent Protocol/3 authentication bypass2020-01-29

💬Community

2
Bugzilla
CVE-2020-2099 jenkins: Inbound TCP Agent Protocol/3 authentication bypass [fedora-all]2020-01-31
Bugzilla
CVE-2020-2099 jenkins: Inbound TCP Agent Protocol/3 authentication bypass2020-01-31
CVE-2020-2099 — Use of Insufficiently Random Values | cvebase