Lucene search

K
cve[email protected]CVE-2020-15679
HistoryDec 22, 2022 - 8:15 p.m.

CVE-2020-15679

2022-12-2220:15:10
CWE-384
web.nvd.nist.gov
50
cve-2020-15679
vpn
oauth
session fixation
vulnerability
mozilla
ios
windows
android

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.1%

An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360).

Affected configurations

Vulners
NVD
Node
mozillamozilla_vpnRange929
OR
mozillamozilla_vpnRange1.2.2
OR
mozillamozilla_vpnRange1360
VendorProductVersionCPE
mozillamozilla_vpn*cpe:2.3:a:mozilla:mozilla_vpn:*:*:*:*:*:*:*:*
mozillamozilla_vpn*cpe:2.3:a:mozilla:mozilla_vpn:*:*:*:*:*:*:*:*
mozillamozilla_vpn*cpe:2.3:a:mozilla:mozilla_vpn:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Mozilla",
    "product": "Mozilla VPN iOS 1.0.7",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "(929)",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Mozilla",
    "product": "Mozilla VPN Windows",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "1.2.2",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Mozilla",
    "product": "Mozilla VPN Android 1.1.0",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "(1360)",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.1%

Related for CVE-2020-15679