Lucene search

K
cve[email protected]CVE-2018-6979
HistoryOct 05, 2018 - 12:29 p.m.

CVE-2018-6979

2018-10-0512:29:00
web.nvd.nist.gov
25
vmware
workspace one
unified endpoint management
saml
authentication bypass
cve-2018-6979
nvd

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.9%

The VMware Workspace ONE Unified Endpoint Management Console (A/W Console) 9.7.x prior to 9.7.0.3, 9.6.x prior to 9.6.0.7, 9.5.x prior to 9.5.0.16, 9.4.x prior to 9.4.0.22, 9.3.x prior to 9.3.0.25, 9.2.x prior to 9.2.3.27, and 9.1.x prior to 9.1.5.6 contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. This vulnerability is also relevant if certificate-based authentication is not enabled, but the outcome of exploitation is limited to an information disclosure (Important Severity) in those cases.

Affected configurations

NVD
Node
vmwareairwatch_consoleRange9.1.0.09.1.5.6
OR
vmwareairwatch_consoleRange9.2.0.09.2.3.27
OR
vmwareairwatch_consoleRange9.3.0.09.3.0.25
OR
vmwareairwatch_consoleRange9.4.0.09.4.0.22
OR
vmwareairwatch_consoleRange9.5.0.09.5.0.16
OR
vmwareairwatch_consoleRange9.6.0.09.6.0.7
OR
vmwareairwatch_consoleRange9.7.0.09.7.0.3

CNA Affected

[
  {
    "product": "VMware Workspace ONE Unified Endpoint Management Console (AirWatch Console)",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "9.7.x prior to 9.7.0.8"
      },
      {
        "status": "affected",
        "version": "9.6.x prior to 9.6.0.8"
      },
      {
        "status": "affected",
        "version": "9.5.x prior to 9.5.0.17"
      },
      {
        "status": "affected",
        "version": "9.4.x prior to 9.4.0.23"
      },
      {
        "status": "affected",
        "version": "9.3.x prior to 9.3.0.25"
      },
      {
        "status": "affected",
        "version": "9.2.x prior to 9.2.3.28"
      },
      {
        "status": "affected",
        "version": "9.1.x prior to 9.1.5.6"
      }
    ]
  }
]

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.9%

Related for CVE-2018-6979