CVE-2024-5764
NixOS vulnerability analysis and mitigation

Overview

A Use of Hard-coded Credentials vulnerability (CVE-2024-5764) was discovered in Sonatype Nexus Repository versions 3.0.0 through 3.72.0. The vulnerability exists in the code responsible for encrypting secrets stored in the Nexus Repository configuration database, including SMTP credentials, HTTP proxy credentials, user tokens, and other sensitive information. The affected versions relied on a static hard-coded encryption passphrase, and while administrators could define an alternate encryption passphrase, this could only be done at first boot and could not be updated subsequently (Vendor Advisory, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N. Additionally, Sonatype has assigned a CVSS v4.0 score of 5.9 (Medium) with the vector string CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials) (NVD).

Impact

If an attacker gains access to the internal database of the Nexus Repository deployment and the secrets are encrypted only with the default static hard-coded encryption passphrase, all stored secrets would be trivially reversible. This affects sensitive information such as SMTP credentials, HTTP proxy credentials, user tokens, and other stored secrets (Vendor Advisory).

Mitigation and workarounds

Sonatype strongly recommends upgrading all affected instances to Nexus Repository version 3.73.0 or later. After upgrading, administrators should follow the instructions provided at the re-encryption documentation to set a new passphrase and re-encrypt stored secrets. The new version includes a mechanism that allows configuration of an encryption passphrase, rotation with a new value, and re-encryption of any stored secrets (Vendor Advisory).

Community reactions

The vulnerability was discovered and reported responsibly by Dylan Evans of Maveris, LLC through Sonatype's Bug Bounty Program. Sonatype has taken a proactive approach in their outreach activities to achieve rapid remediation for their customers and users (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12819HIGH8.1
  • NixOSNixOS
  • pgbouncer
NoYesDec 03, 2025
CVE-2025-20777MEDIUM6.7
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-65105MEDIUM5.3
  • NixOSNixOS
  • apptainer
NoYesDec 02, 2025
CVE-2025-20789MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-20788MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management