{"id":7279,"date":"2020-02-12T15:42:00","date_gmt":"2020-02-12T15:42:00","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=7279"},"modified":"2023-06-21T11:42:50","modified_gmt":"2023-06-21T11:42:50","slug":"jenkins-server-exposed-to-dos-attacks","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/jenkins-server-exposed-to-dos-attacks\/","title":{"rendered":"Jenkins server exposed to DoS Attacks"},"content":{"rendered":"\n<p>There has been an alert to DevOps to take precaution against an imminent Jenkins server exposure. Security researchers are warning that 12,000 cloud automation servers  around the world could be hijacked to launch denial of service (DoS)  attacks.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-3503096812\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-997518201\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/76065\" rel=\"noopener\" class=\"notrack\" aria-label=\"26002\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2025\/10\/26002.jpg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2025\/10\/26002.jpg 1200w, https:\/\/gtechbooster.com\/media\/2025\/10\/26002-768x768.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>Radware issued an emergency response team threat alert yesterday after discovering 12,802 Jenkins servers that are still vulnerable to a flaw patched at the end of January.<\/p>\n\n\n\n<p>Discovered by Adam Thorn of the University of Cambridge, \nCVE-2020-2100 affects Jenkins 2.218 and earlier as well as LTS 2.204.1 \nand earlier.<\/p>\n\n\n\n<p>\u201cJenkins\u2019 vulnerability is caused by an auto-discovery protocol that \nis enabled by default and exposed in publicly facing servers,\u201d explained\n Radware security evangelist, Pascal Geenens. \u201cDisabling the discovery \nprotocol is only a single edit in the configuration file of Jenkins and \nit got fixed in last week\u2019s patch from a default enabled to disabled.\u201d<\/p>\n\n\n\n<p>The bug could enable attackers to compromise exposed servers to \nlaunch two different types of DoS: an amplification attack and an \ninfinite loop attack.<\/p>\n\n\n\n<p>The latter was described by Geenens as \u201cparticularly nasty,\u201d because \n\u201cwith a single spoofed packet, a threat actor can make two servers go \ninto an infinite loop of replies, and they cannot be stopped unless one \nof the servers is rebooted or has its Jenkins service restarted.<\/p>\n\n\n\n<p>\u201cThe same exposed service can also be abused by malicious actors to \nperform DDoS amplification attacks against random victims on the \ninternet \u2013 victims do not have to run or expose Jenkins for the \namplification attack to impact them,\u201d he continued.<\/p>\n\n\n\n<p>\u201cIf your DevOps teams are using Jenkins servers in their cloud or \non-prem environments, there is a simple solution: either disable \nauto-discovery protocol if you do not use it or add a firewall policy to\n block access to port udp\/33848.\u201d<\/p>\n\n\n\n<p>Open source Jenkins servers are popular among DevOps teams, which use  them to build, test and deploy apps running in the cloud in  environments such as Amazon Web Services, OVH, Hetzner, Host Europe,  DigitalOcean\u00a0and Linode.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More Information<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/mediaserver.responsesource.com\/mediabank\/18328\/RadwareERTAlert2020\/ERTAlertJenkinsFINALV3.pdf\">Radware emergency response team threat alert<\/a><\/li><\/ul>\n<div class=\"gtech-end-cont\" id=\"gtech-2628094131\"><div style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"gtech-3170923141\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/78735\" rel=\"noopener\" class=\"notrack\" aria-label=\"005\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2026\/03\/005.webp\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2026\/03\/005.webp 1000w, https:\/\/gtechbooster.com\/media\/2026\/03\/005-768x768.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>There has been an alert to DevOps to take precaution against an imminent Jenkins server exposure. Security researchers are warning that 12,000 cloud automation servers around the world could be hijacked to launch denial of service (DoS) attacks. Radware issued an emergency response team threat alert yesterday after discovering 12,802 Jenkins servers that are still [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":7280,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[181,1161,1162],"class_list":["post-7279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-cloud-computing","tag-computer-hacking","tag-jenkins"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/7279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=7279"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/7279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/7280"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=7279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=7279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=7279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}