Vulnerability Description
Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Osquery | < 4.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/osquery/osquery/pull/6197PatchThird Party Advisory
- https://www.facebook.com/security/advisories/cve-2020-1887Third Party Advisory
- https://github.com/osquery/osquery/pull/6197PatchThird Party Advisory
- https://www.facebook.com/security/advisories/cve-2020-1887Third Party Advisory
FAQ
What is CVE-2020-1887?
CVE-2020-1887 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
How severe is CVE-2020-1887?
CVE-2020-1887 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-1887?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Osquery.