Vulnerability Name:

CVE-2020-26892 (CCN-191005)

Assigned:2020-11-02
Published:2020-11-02
Updated:2022-01-01
Summary:The JWT library in NATS nats-server before 2.1.9 has Incorrect Access Control because of how expired credentials are handled.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-798
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2020-26892

Source: XF
Type: UNKNOWN
nats-cve202026892-sec-bypass(191005)

Source: CCN
Type: jwt GIT Repository
NATS JWT

Source: CCN
Type: nats-server GIT Repository
NATS Server

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/nats-io/nats-server/commits/master

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-2c8851d48b

Source: CCN
Type: oss-sec Mailing List, Mon, 19 Oct 2020 20:00:21 +0800 (CST)
[CVE-2020-26521][CVE-2020-26892] NATS JWT vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6854977 (Cloud Pak for Security)
IBM Cloud Pak for Security includes components with multiple known vulnerabilities

Source: CONFIRM
Type: Mailing List, Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/11/02/2

Vulnerable Configuration:Configuration 1:
  • cpe:/a:linuxfoundation:nats-server:*:*:*:*:*:*:*:* (Version < 2.1.9)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:nats:nats_server:2.1.8:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:cloud_pak_for_security:1.10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    linuxfoundation nats-server *
    fedoraproject fedora 33
    nats nats server 2.1.8
    ibm cloud pak for security 1.10.0.0
    ibm cloud pak for security 1.10.6.0