(wiz.io) Jenkins in the Crosshairs: Analyzing the Threat Landscape of CI/CD OrchestrationJenkins CI/CD environments are under active exploitation, with 59% of cloud deployments vulnerable to critical-severity flaws and 87% running end-of-life instances. Attackers leverage exposed script consoles, misconfigured pipelines, and compromised agents for RCE, credential theft, and lateral movement into cloud control planes.In brief - Jenkins remains a prime target due to unpatched core vulnerabilities, deprecated plugins (31% of environments), and misconfigurations. Threat actors exploit these to gain RCE, steal credentials, and pivot into cloud environments, necessitating urgent patching, plugin lifecycle management, and hardening.Technically - Jenkins' attack surface includes unpatched core CVEs, deprecated plugins (31%), and critical plugin vulnerabilities (21%). Attackers exploit exposed script consoles for RCE, abuse CI/CD pipelines for secret extraction, and compromise agents for lateral movement. Cloud IAM risks arise from credential theft via instance metadata services, emphasizing the need for least-privilege access and secure pipeline design.Source: https://www.wiz.io/blog/jenkins-threat-risk-insights#Cybersecurity #ThreatIntel