CVE-2018-8929

Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
Configurations

Configuration 1 (hide)

cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:14

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 8.1
v2 : 6.8
v3 : 7.3
References () https://www.synology.com/en-global/support/security/Synology_SA_18_19 - Vendor Advisory () https://www.synology.com/en-global/support/security/Synology_SA_18_19 - Vendor Advisory

Information

Published : 2018-07-06 12:29

Updated : 2024-11-21 04:14


NVD link : CVE-2018-8929

Mitre link : CVE-2018-8929

CVE.ORG link : CVE-2018-8929


JSON object : View

Products Affected

synology

  • ssl_vpn_client
CWE
CWE-319

Cleartext Transmission of Sensitive Information

CWE-417

Communication Channel Errors