9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.4%
Certain versions of the Atlassian Companion App for MacOS were affected by a remote code execution vulnerability. An attacker could utilize WebSockets to bypass Atlassian Companion’s blocklist and MacOS Gatekeeper to allow execution of code.
[
{
"vendor": "Atlassian",
"product": "Companion for Mac",
"versions": [
{
"version": "< 1.0.0",
"status": "unaffected"
},
{
"version": ">= 1.0.0",
"status": "affected"
},
{
"version": ">= 1.1.0",
"status": "affected"
},
{
"version": ">= 1.2.0",
"status": "affected"
},
{
"version": ">= 1.2.2",
"status": "affected"
},
{
"version": ">= 1.2.3",
"status": "affected"
},
{
"version": ">= 1.2.4",
"status": "affected"
},
{
"version": ">= 1.2.5",
"status": "affected"
},
{
"version": ">= 1.2.6",
"status": "affected"
},
{
"version": ">= 1.3.0",
"status": "affected"
},
{
"version": ">= 1.3.1",
"status": "affected"
},
{
"version": ">= 1.4.1",
"status": "affected"
},
{
"version": ">= 1.4.2",
"status": "affected"
},
{
"version": ">= 1.4.3",
"status": "affected"
},
{
"version": ">= 1.4.4",
"status": "affected"
},
{
"version": ">= 1.4.5",
"status": "affected"
},
{
"version": ">= 1.4.6",
"status": "affected"
},
{
"version": ">= 1.5.0",
"status": "affected"
},
{
"version": ">= 1.6.0",
"status": "affected"
},
{
"version": ">= 1.6.1",
"status": "affected"
},
{
"version": ">= 2.0.0",
"status": "unaffected"
},
{
"version": ">= 2.0.1",
"status": "unaffected"
}
]
}
]
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.4%