The Jenkins security team has revealed that certain SSH build agent Docker images reuse SSH host keys, allowing attackers to potentially hijack network traffic between Jenkins controllers and build agents.
The Jenkins security advisory (released April 10, 2025) identifies two distinct CVEs affecting different image variants:
The core issue stems from how SSH host keys are generated during image creation for Debian-based Docker images.
In affected versions, all containers built from the same image share identical SSH host keys, fundamentally undermining the security model that relies on unique server identification.
Technical Explanation: In jenkins/ssh-agent 6.11.1 and earlier (and all jenkins/ssh-slave versions), SSH host keys are generated at image creation time rather than container instantiation time.
This means that every container instance using the same base image will present identical cryptographic identity credentials.
As the advisory explains: “This allows attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter”.
The vulnerability impacts:
jenkins/ssh-agent:
jenkins/ssh-slave (deprecated):
Unaffected image variants include all jenkins/ssh-agent and jenkins/ssh-slave variants based on Alpine, NanoServer, or Windows.
An attacker who can position themselves between a Jenkins controller and a build agent could intercept and hijack sensitive network traffic without triggering SSH authenticity warnings.
This man-in-the-middle position could be leveraged to:
The Jenkins project has released version 6.11.2 of jenkins/ssh-agent Docker images, which addresses this vulnerability with a critical security enhancement:
# The fix implemented in version 6.11.2
# Deletes pre-generated SSH host keys during image creation
# New host keys are generated on first container startup Users of jenkins/ssh-agent Docker images should immediately update to version 6.11.2.
For users of the deprecated jenkins/ssh-slave images, no fix will be provided.
The Jenkins team strongly recommends migrating to the updated jenkins/ssh-agent images as soon as possible.
This vulnerability highlights the critical importance of proper cryptographic key management in containerized environments.
Organizations using Jenkins in Docker environments should audit their deployments and update affected images immediately to protect their software supply chains from potential compromise.
The Jenkins team credited security researcher Abhishek Reddypalle for discovering and reporting these vulnerabilities.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Jenkins Docker Images Expose Network Path to Potential Attacker Insertion appeared first on Cyber Security News.
In September, Donald Trump claimed that "the United States is getting a tremendous fee" for…
ABILENE, Texas (KTAB/KRBC) - Two men in Abilene, a father and son, were arrested Friday…
According to Reuters, Meta is looking to offset spending on AI and data centers with…
Hulu has decided to scrap Buffy the Vampire Slayer: New Sunnydale, its planned continuation series…
Jostling a folded piece of paper, holding it marooned in the air, selectman Beth Blair…
Boscawen voters cruised through a speedy town meeting Friday night, one with so little controversy…
This website uses cookies.