Vulnerability Description
A local, authenticated attacker can bypass the passcode in the VideoLAN VLC media player app before 3.1.5 for iOS by opening a URL and turning the phone.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Videolan | Vlc For Mobile | < 3.1.5 |
Related Weaknesses (CWE)
References
- https://github.com/videolan/vlc-ios/pull/178/commits/d84d7c0a94eb7fba202d2c5fc37PatchThird Party Advisory
- https://itunes.apple.com/ms/app/vlc-for-mobile/id650377962?mt=8ProductThird Party Advisory
- https://github.com/videolan/vlc-ios/pull/178/commits/d84d7c0a94eb7fba202d2c5fc37PatchThird Party Advisory
- https://itunes.apple.com/ms/app/vlc-for-mobile/id650377962?mt=8ProductThird Party Advisory
FAQ
What is CVE-2018-19937?
CVE-2018-19937 is a vulnerability with a CVSS score of 6.6 (MEDIUM). A local, authenticated attacker can bypass the passcode in the VideoLAN VLC media player app before 3.1.5 for iOS by opening a URL and turning the phone.
How severe is CVE-2018-19937?
CVE-2018-19937 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19937?
Check the references section above for vendor advisories and patch information. Affected products include: Videolan Vlc For Mobile.