Lucene search

K
nvd[email protected]NVD:CVE-2020-15679
HistoryDec 22, 2022 - 8:15 p.m.

CVE-2020-15679

2022-12-2220:15:10
CWE-384
web.nvd.nist.gov
1
cve-2020-15679
vpn login flow
session fixation
attacker
authenticated access
source ip
session states
vpn sessions
mozilla vpn ios
mozilla vpn windows
mozilla vpn android

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

44.9%

An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360).

Affected configurations

NVD
Node
mozillavpnRange<1.0.7_\(929\)iphone_os
OR
mozillavpnRange<1.2.2windows
OR
mozillavpnRange1.0.71.0.7_\(929\)ipados
OR
mozillavpnRange1.1.01.1.0_\(1360\)android

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

44.9%

Related for NVD:CVE-2020-15679