- Description
- Lack of administrator control over security vulnerability in client.cgi in Synology SSL VPN Client before 1.2.5-0226 allows remote attackers to conduct man-in-the-middle attacks via the (1) command, (2) hostname, or (3) port parameter.
- Source
- security@synology.com
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 7.4
- Impact score
- 5.2
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
- nvd@nist.gov
- NVD-CWE-noinfo
- security@synology.com
- CWE-671
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "71337741-F4A7-477A-86F7-DC185CE3EFDE",
"versionEndExcluding": "1.2.5-0226"
}
],
"operator": "OR"
}
]
}
]