8.2
CVE-2020-11024
- EPSS 0.22%
- Veröffentlicht 29.04.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:36
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Moonlight-stream ≫ Moonlight SwPlatformiphone_os Version < 4.0.1
Moonlight-stream ≫ Moonlight SwPlatformtvos Version < 4.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.22% | 0.416 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.2 | 1.8 | 5.8 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
|
| nvd@nist.gov | 4.9 | 6.8 | 4.9 |
AV:N/AC:M/Au:S/C:P/I:P/A:N
|
| security-advisories@github.com | 6.1 | 0.3 | 5.3 |
CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-300 Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.