Cyber Posture

CVE-2025-68703

High

Published: 13 January 2026

Published
13 January 2026
Modified
20 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0001 1.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68703 is a high-severity Inadequate Encryption Strength (CWE-326) vulnerability in Samrocketman Jervis. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Reduce Key Space (T1600.001); ranked at the 1.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Reduce Key Space (T1600.001).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-326

Maintaining currency with technologies and practices reduces selection of encryption mechanisms that provide inadequate strength.

addresses: CWE-326

Updated assessments identify when previously adequate encryption strength no longer meets current attack capabilities or compliance drivers.

addresses: CWE-326

Establishment procedures require selection and generation of keys with adequate length and strength for the chosen algorithm.

addresses: CWE-326

Specifies required cryptography types and parameters, preventing selection of inadequate encryption strength.

addresses: CWE-326

Prompt patching corrects inadequate encryption strength when vendors release updates that increase key sizes or algorithm security.

MITRE ATT&CK Enterprise TechniquesAI

T1600.001 Reduce Key Space Defense Impairment
Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.
Why these techniques?

Predictable salt from passphrase directly reduces key derivation strength, enabling plaintext recovery from ciphertexts (matches Reduce Key Space).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the salt is derived from sha256Sum(passphrase). Two encryption operations with the same password will have the same derived key. This vulnerability is fixed…

more

in 2.2.

Deeper analysisAI

CVE-2025-68703, published on 2026-01-13, is a vulnerability in the Jervis library, which supports Job DSL plugin scripts and shared Jenkins pipeline libraries. In versions prior to 2.2, the salt used in key derivation is computed as sha256Sum(passphrase), resulting in identical derived keys for multiple encryption operations performed with the same passphrase. This issue, classified under CWE-326 (Inadequate Encryption Strength), carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

The vulnerability enables exploitation by any network-accessible attacker without requiring privileges, user interaction, or special conditions. Attackers can achieve high confidentiality impact, such as recovering plaintext from encrypted data when multiple ciphertexts share the same passphrase-derived key.

Mitigation is provided in Jervis version 2.2, which addresses the flawed salt derivation. Security advisories recommend upgrading to 2.2 or later; details are available in the GitHub security advisory at https://github.com/samrocketman/jervis/security/advisories/GHSA-36h5-vrq6-pp34 and the fixing commit at https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a.

Details

CWE(s)

Affected Products

samrocketman
jervis
≤ 2.2

CVEs Like This One

CVE-2025-68698Same product: Samrocketman Jervis
CVE-2025-68931Same product: Samrocketman Jervis
CVE-2025-68704Same product: Samrocketman Jervis
CVE-2025-68702Same product: Samrocketman Jervis
CVE-2025-68701Same product: Samrocketman Jervis
CVE-2024-54089Shared CWE-326
CVE-2025-36379Shared CWE-326
CVE-2026-28377Shared CWE-326
CVE-2026-33488Shared CWE-326
CVE-2018-25272Shared CWE-326

References