HomeSonatypeCVE-2024-5764

CVE-2024-5764

MEDIUM
5.9CVSS
Published: 2024-10-23
Updated: 2025-11-06
AI Analysis

Description

Use of Hard-coded Credentials vulnerability in Sonatype Nexus Repository has been discovered in the code responsible for encrypting any secrets stored in the Nexus Repository configuration database (SMTP or HTTP proxy credentials, user tokens, tokens, among others). The affected versions relied on a static hard-coded encryption passphrase. While it was possible for an administrator to define an alternate encryption passphrase, it could only be done at first boot and not updated. This issue affects Nexus Repository: from 3.0.0 through 3.72.0.

CVSS Metrics

Vector
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
local
Complexity
low
Privileges
none
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-798CWE-798

Metadata

Primary Vendor
SONATYPE
Published
10/23/2024
Last Modified
11/6/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sonatype : nexus_repository_manager

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-5764 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com