Improper Verification of Cryptographic Signature Affecting github.com/neuvector/neuvector package, versions <5.2.2


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMNEUVECTORNEUVECTOR-5950417
  • published9 Oct 2023
  • disclosed6 Oct 2023
  • creditDejan Zelic

Introduced: 6 Oct 2023

CVE-2023-32188  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade github.com/neuvector/neuvector to version 5.2.2 or higher.

Overview

github.com/neuvector/neuvector is a NeuVector Full Lifecycle Container Security Platform delivers the only cloud-native security with uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature via the JWT token that is used in authentication for Manager and API access. An attacker can reverse engineer it, forging a valid NeuVector Token to perform malicious activity. This can lead to unauthorized actions, including the execution of arbitrary code on the system by exploiting the compromised token.

Workaround

This vulnerability can be mitigated by replacing the Manager & Controller certificate manually.

CVSS Scores

version 3.1