CVE-2023-32077

Source
https://cve.org/CVERecord?id=CVE-2023-32077
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32077.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-32077
Aliases
Published
2023-08-24T21:23:14.294Z
Modified
2026-04-16T03:47:18.234870Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Netmaker has Hardcoded DNS Secret Key
Details

Netmaker makes networks with WireGuard. Prior to versions 0.17.1 and 0.18.6, hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints. The issue is patched in 0.17.1 and fixed in 0.18.6. If users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1 and docker-compose up -d. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone who is using version 0.17.1 can pull the latest docker image of the backend and restart the server.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32077.json",
    "cwe_ids": [
        "CWE-321"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/gravitl/netmaker

Affected ranges

Type
GIT
Repo
https://github.com/gravitl/netmaker
Events

Affected versions

v0.*
v0.18.0
v0.18.1
v0.18.2
v0.18.3
v0.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32077.json"