Vulnerability Description
Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Duo Network Gateway | <= 1.2.9 |
Related Weaknesses (CWE)
References
- https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementExploitVendor Advisory
- https://www.kb.cert.org/vuls/id/475445Third Party AdvisoryUS Government Resource
- https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementExploitVendor Advisory
- https://www.kb.cert.org/vuls/id/475445Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2018-7340?
CVE-2018-7340 is a vulnerability with a CVSS score of 7.5 (HIGH). Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without ...
How severe is CVE-2018-7340?
CVE-2018-7340 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7340?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Duo Network Gateway.