Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68698: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in samrocketman jervis

0
High
VulnerabilityCVE-2025-68698cvecve-2025-68698cwe-327
Published: Tue Jan 13 2026 (01/13/2026, 19:16:01 UTC)
Source: CVE Database V5
Vendor/Project: samrocketman
Product: jervis

Description

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses PKCS1Encoding which is vulnerable to Bleichenbacher padding oracle attacks. Modern systems should use OAEP (Optimal Asymmetric Encryption Padding). This vulnerability is fixed in 2.2.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:41:12 UTC

Technical Analysis

CVE-2025-68698 identifies a cryptographic vulnerability in the Jervis library, a tool commonly used to facilitate Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to version 2.2, Jervis employs PKCS1Encoding for RSA encryption padding, which is vulnerable to Bleichenbacher padding oracle attacks. These attacks exploit the deterministic nature of PKCS#1 v1.5 padding to reveal information about encrypted messages by sending crafted ciphertexts and analyzing server responses, effectively allowing an attacker to decrypt data or forge signatures without possessing the private key. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The fix implemented in version 2.2 replaces PKCS1Encoding with OAEP (Optimal Asymmetric Encryption Padding), a modern padding scheme that mitigates padding oracle attacks by incorporating randomness and a more secure encoding process. Although no known exploits are currently reported in the wild, the vulnerability's CVSS 4.0 score of 8.7 reflects its high potential impact and ease of exploitation. The vulnerability affects all Jervis versions before 2.2, which may be embedded in Jenkins pipelines used for continuous integration and deployment workflows, potentially exposing sensitive build or deployment secrets and undermining pipeline integrity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of their CI/CD pipelines, especially those relying on Jenkins automation with embedded Jervis library versions prior to 2.2. Exploitation could lead to unauthorized decryption of sensitive credentials, tokens, or proprietary code artifacts, enabling further lateral movement or supply chain compromise. The integrity of build processes could be undermined by forged signatures or manipulated pipeline scripts, potentially introducing malicious code into production environments. Given the widespread use of Jenkins in European enterprises, including critical infrastructure sectors such as finance, manufacturing, and government, the impact could be severe, resulting in data breaches, operational disruptions, and reputational damage. The vulnerability's network-exploitable nature and lack of required authentication increase the attack surface and urgency for remediation.

Mitigation Recommendations

European organizations should immediately upgrade all instances of the Jervis library to version 2.2 or later to ensure the use of secure OAEP padding. In addition, organizations should audit their Jenkins pipeline configurations to identify any usage of vulnerable Jervis versions and replace or patch them accordingly. It is advisable to review cryptographic implementations within CI/CD pipelines to ensure adherence to modern standards and avoid deprecated algorithms or padding schemes. Network-level protections such as strict firewall rules and segmentation should be enforced to limit exposure of Jenkins servers to untrusted networks. Monitoring and logging of Jenkins pipeline activities should be enhanced to detect anomalous decryption attempts or unusual pipeline behavior indicative of exploitation attempts. Finally, organizations should incorporate cryptographic security reviews into their DevSecOps practices to prevent recurrence of similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-23T17:11:35.076Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69669c68a60475309fa82b3f

Added to database: 1/13/2026, 7:26:32 PM

Last enriched: 1/13/2026, 7:41:12 PM

Last updated: 1/14/2026, 3:42:48 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats