Vulnerability Description
webrtc-native uses WebRTC from chromium project. webrtc-native downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webrtc | Webrtc-Native | <= 1.4.0 |
Related Weaknesses (CWE)
References
- https://nodesecurity.io/advisories/176Third Party Advisory
- https://nodesecurity.io/advisories/176Third Party Advisory
FAQ
What is CVE-2016-10600?
CVE-2016-10600 is a vulnerability with a CVSS score of 8.1 (HIGH). webrtc-native uses WebRTC from chromium project. webrtc-native downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE)...
How severe is CVE-2016-10600?
CVE-2016-10600 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10600?
Check the references section above for vendor advisories and patch information. Affected products include: Webrtc Webrtc-Native.