CVE-2019-14899

Published Dec 11, 2019

Last updated 2 years ago

Overview

Description
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.
Source
secalert@redhat.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.4
Impact score
5.9
Exploitability score
1.5
Vector string
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 3.0

Type
Secondary
Base score
7.4
Impact score
5.9
Exploitability score
1.5
Vector string
CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
4.9
Impact score
6.4
Exploitability score
4.4
Vector string
AV:A/AC:M/Au:S/C:P/I:P/A:P

Weaknesses

secalert@redhat.com
CWE-300
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score
Not currently trending

Configurations