Security for everyone

CVE-2023-42442 Scanner

Detects 'Improper Access Control' vulnerability in JumpServer affects v. from 3.0.0 before 3.5.5 and 3.6.x before 3.6.4.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




JumpServer is an indispensable open source bastion host and a professional operation and maintenance security audit system used for monitoring and managing remote servers. With JumpServer, IT teams can secure and streamline their infrastructure and protect it against unauthorized access or attacks. 

Recently, a critical vulnerability has been detected in JumpServer versions prior to 3.5.5 and 3.6.4, namely the CVE-2023-42442. This vulnerability allows attackers to download session replays without authentication, which poses a serious security risk to the infrastructure. In other words, attackers can gain access to sensitive information and possibly even take over the system. 

The exploitation of this vulnerability can lead to severe consequences such as data breaches, unauthorized access, and even complete system compromise. In addition, it can also threaten the privacy, confidentiality, and integrity of sensitive information, putting the organization's reputation and compliance with regulations at risk. For this reason, it is imperative to take proactive measures to mitigate this vulnerability immediately. 

Thanks to the pro features of, you can easily and quickly learn about vulnerabilities in your digital assets and take the necessary measures to protect your infrastructure. With advanced scanning and reporting capabilities, you can detect vulnerabilities, prioritize them based on their severity, and receive actionable recommendations to mitigate them. Additionally, you can set up alerts to be notified of any potential threat in real-time and stay ahead of cyber threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture