CVE-2017-2608
moderate-risk
Published 2018-05-15
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
Do I need to act?
~
3.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/95953
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2608
Vendor Advisory
https://jenkins.io/security/advisory/2017-02-01/
Third Party Advisory
http://www.securityfocus.com/bid/95953
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2608
Vendor Advisory
https://jenkins.io/security/advisory/2017-02-01/
43
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
6/34 · Minimal
Exposure
7/34 · Low