
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-2146 is a security vulnerability discovered in Jenkins Mac Plugin versions 1.1.0 and earlier. The vulnerability was disclosed on March 9, 2020, affecting the SSH host key validation functionality when connecting to agents created by the plugin (Jenkins Advisory, NVD). The vulnerability was assigned a medium severity CVSS score.
The vulnerability stems from the Mac Plugin's failure to validate SSH host keys when establishing connections to Mac Cloud hosts launched by the plugin. This security flaw exists in versions 1.1.0 and earlier of the plugin. The vulnerability has been assigned a CVSS v3.1 base score of 7.4 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N (NVD).
The absence of SSH host key validation could be exploited through man-in-the-middle attacks, potentially allowing attackers to intercept connections between Jenkins and its build agents. This could lead to unauthorized access to build processes and sensitive information exchanged between Jenkins and the affected agents (Jenkins Advisory).
The vulnerability was fixed in Mac Plugin version 1.2.0, which implements proper SSH host key validation when connecting to agents. Users are strongly advised to upgrade to this version or later to address the security issue (Jenkins Advisory).
The vulnerability was discovered and reported by Raihaan Shouhell from Autodesk, Inc., demonstrating ongoing security research efforts in the Jenkins ecosystem (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."