Vulnerability Description
The default configuration of the server in MobaXterm before 8.3 has a disabled Access Control setting and consequently does not require authentication for X11 connections, which allows remote attackers to execute arbitrary commands or obtain sensitive information via X11 packets.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mobatek | Mobaxterm | <= 8.2 |
Related Weaknesses (CWE)
References
- http://blog.mobatek.net/post/mobaxterm-new-release-8.3/PatchVendor Advisory
- http://www.kb.cert.org/vuls/id/316888Third Party AdvisoryUS Government Resource
- http://www.securifera.com/advisories/cve-2015-7244
- http://blog.mobatek.net/post/mobaxterm-new-release-8.3/PatchVendor Advisory
- http://www.kb.cert.org/vuls/id/316888Third Party AdvisoryUS Government Resource
- http://www.securifera.com/advisories/cve-2015-7244
FAQ
What is CVE-2015-7244?
CVE-2015-7244 is a vulnerability with a CVSS score of 7.5 (HIGH). The default configuration of the server in MobaXterm before 8.3 has a disabled Access Control setting and consequently does not require authentication for X11 connections, which allows remote attacker...
How severe is CVE-2015-7244?
CVE-2015-7244 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7244?
Check the references section above for vendor advisories and patch information. Affected products include: Mobatek Mobaxterm.