Lucene search

K
cvelistMozillaCVELIST:CVE-2020-15679
HistoryDec 22, 2022 - 12:00 a.m.

CVE-2020-15679

2022-12-2200:00:00
mozilla
www.cve.org
2
oauth session
vpn login
attacker access
ip sharing
session fixation
mozilla vpn
ios
windows
android

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.9%

An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360).

CNA Affected

[
  {
    "vendor": "Mozilla",
    "product": "Mozilla VPN iOS 1.0.7",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "(929)",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Mozilla",
    "product": "Mozilla VPN Windows",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "1.2.2",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "Mozilla",
    "product": "Mozilla VPN Android 1.1.0",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "(1360)",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.9%

Related for CVELIST:CVE-2020-15679