Netmaker is a platform for creating and managing virtual overlay networks using WireGuard. Prior to versions 0.8.5, 0.9.4, and 010.0, there is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server if the exploiter know the address and username of the admin. This effects the server (netmaker) component, and not clients. This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee | Patch Third Party Advisory |
https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87 | Patch Third Party Advisory |
https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080 | Patch Third Party Advisory |
https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-02-18 14:15
Updated : 2022-03-08 08:30
NVD link : CVE-2022-23650
Mitre link : CVE-2022-23650
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
gravitl
- netmaker