Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/gravitl/netmaker
  4. ›
  5. CVE-2023-32077

CVE-2023-32077: Use of Hard-coded Cryptographic Key

August 25, 2023

Netmaker makes networks with WireGuard. Prior to versions 0.17.1 and 0.18.6, hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints. The issue is patched in 0.17.1 and fixed in 0.18.6. If users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1 and docker-compose up -d. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone who is using version 0.17.1 can pull the latest docker image of the backend and restart the server.

References

  • github.com/advisories/GHSA-8x8h-hcq8-jwwx
  • github.com/gravitl/netmaker/commit/1621c27c1d176b639e9768b2acad7693e387fd51
  • github.com/gravitl/netmaker/commit/9362c39a9a822f0e07361aa7c77af2610597e657
  • github.com/gravitl/netmaker/pull/2170
  • github.com/gravitl/netmaker/security/advisories/GHSA-8x8h-hcq8-jwwx
  • nvd.nist.gov/vuln/detail/CVE-2023-32077

Code Behaviors & Features

Detect and mitigate CVE-2023-32077 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.17.1, all versions starting from 0.18.0 before 0.18.6

Fixed versions

  • v0.17.1
  • v0.18.6

Solution

Upgrade to versions 0.17.1, 0.18.6 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-321: Use of Hard-coded Cryptographic Key

Source file

go/github.com/gravitl/netmaker/CVE-2023-32077.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:38 +0000.