Jenkins ssh-slave Docker Image SSH Host Key Reuse

critical Nessus Plugin ID 248557

Synopsis

A docker container on the remote host is affected by an SSH host key reuse vulnerability.

Description

According to their self-reported version numbers, the jenkins/ssh-slave docker containers running on the remote web server are affected by an SSH host key reuse vulnerability. In jenkins/ssh-slave Docker images, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version to use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Discontinue use of jenkins/ssh-slave. Use a supported version of jenkins/ssh-agent instead.

See Also

https://www.jenkins.io/security/advisory/2025-04-10/

Plugin Details

Severity: Critical

ID: 248557

File Name: jenkins_security_advisory_2025-04-10_ssh_slave.nasl

Version: 1.1

Type: local

Agent: unix

Family: Misc.

Published: 8/12/2025

Updated: 8/12/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2025-32755

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:jenkins:ssh-slave

Required KB Items: Service/docker

Vulnerability Publication Date: 4/10/2025

Reference Information

CVE: CVE-2025-32755