
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-23650 affects Netmaker, a platform for creating and managing virtual overlay networks using WireGuard. The vulnerability was discovered in versions prior to 0.8.5, 0.9.4, and 0.10.0, where a hard-coded cryptographic key in the codebase could be exploited to execute admin commands on a remote server if the attacker knows the address and username of the admin (GitHub Advisory).
The vulnerability stems from a hard-coded JWT secret key in the codebase (var jwtSecretKey = []byte("(BytesOverTheWire)")) that was used for authentication. This implementation allowed potential attackers to forge valid authentication tokens and execute administrative commands. The vulnerability only affects the server (netmaker) component and not the clients (NVD).
An attacker who knows the server address and admin username could exploit this vulnerability to execute administrative commands on the remote server, potentially leading to unauthorized access and system compromise (GitHub Advisory).
The issue has been patched in Netmaker versions v0.8.5, v0.9.4, and v0.10.0. Users should upgrade to one of these versions. For docker installations, users need to execute: 'docker-compose down', 'docker pull gravitl/netmaker:(version)', and 'docker-compose up -d'. The fix implements a secure random JWT secret generation and storage mechanism (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."