CVE-2023-42820

Secure your products with top-tier expert knowledge and advanced Penetration Testing (CREST Approved)

Let's collaborate to build and maintain secure, trustworthy products

We transform threats into trust by integrating advanced tech and expertise in product security. Our approach encompasses Security by Design, rigorous security assurance and penetration testing, and compliance through expert documentation, from design to post-market. We offer CREST-approved pen testing in EMEA, upholding top security standards.

CREST Approved in EMEA

JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue. (CVSS:8.2) (EPSS:0.05%) (Last Update:2023-09-29 15:04:32)    Latest security vulnerabilities (Gain Information) (CVSS score >= 4) 

More To Explore

Elevating Teleco Security for the Digital Future

Elevating Teleco Security for the Digital Future In the digital era, the telecommunication sector is at the forefront, driven by groundbreaking advancements like 5G and