Vulnerability Description
The Password Manager Extension in Abine Blur 7.8.242* before 7.8.2428 allows attackers to bypass the Multi-Factor Authentication and macOS disk-encryption protection mechanisms, and consequently exfiltrate secured data, because the right-click context menu is not secured.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Abine | Blur | 7.8.2424 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-By
- http://seclists.org/fulldisclosure/2019/Mar/33
- https://addons.mozilla.org/en-US/firefox/addon/donottrackplus/versions/?page=1#vThird Party Advisory
- https://redcoded.com/2018/CVE/Third Party Advisory
- http://packetstormsecurity.com/files/152139/Abine-Blur-7.8.24x-Authentication-By
- http://seclists.org/fulldisclosure/2019/Mar/33
- https://addons.mozilla.org/en-US/firefox/addon/donottrackplus/versions/?page=1#vThird Party Advisory
- https://redcoded.com/2018/CVE/Third Party Advisory
FAQ
What is CVE-2018-7213?
CVE-2018-7213 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Password Manager Extension in Abine Blur 7.8.242* before 7.8.2428 allows attackers to bypass the Multi-Factor Authentication and macOS disk-encryption protection mechanisms, and consequently exfil...
How severe is CVE-2018-7213?
CVE-2018-7213 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-7213?
Check the references section above for vendor advisories and patch information. Affected products include: Abine Blur.