vulnerability
Jenkins Advisory 2020-01-29: CVE-2020-2099: Inbound TCP Agent Protocol/3 authentication bypass
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jan 30, 2020 | Jan 30, 2020 | Mar 27, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jan 30, 2020
Added
Jan 30, 2020
Modified
Mar 27, 2026
Description
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
Solutions
jenkins-lts-upgrade-2_204_2jenkins-upgrade-2_219
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.