Vulnerability Description
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Synology | Ssl Vpn Client | < 1.2.4-0224 |
Related Weaknesses (CWE)
References
- https://www.synology.com/en-global/support/security/Synology_SA_18_19Vendor Advisory
- https://www.synology.com/en-global/support/security/Synology_SA_18_19Vendor Advisory
FAQ
What is CVE-2018-8929?
CVE-2018-8929 is a vulnerability with a CVSS score of 7.3 (HIGH). Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attac...
How severe is CVE-2018-8929?
CVE-2018-8929 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-8929?
Check the references section above for vendor advisories and patch information. Affected products include: Synology Ssl Vpn Client.