Vulnerability Details : CVE-2017-4897
VMware Horizon DaaS before 7.0.0 contains a vulnerability that exists due to insufficient validation of data. An attacker may exploit this issue by tricking DaaS client users into connecting to a malicious server and sharing all their drives and devices. Successful exploitation of this vulnerability requires a victim to download a specially crafted RDP file through DaaS client by clicking on a malicious link.
Vulnerability category: Input validation
Products affected by CVE-2017-4897
- cpe:2.3:a:vmware:horizon_daas:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-4897
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-4897
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:M/Au:N/C:C/I:N/A:N |
8.6
|
6.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2017-4897
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-4897
-
http://www.securitytracker.com/id/1037951
VMware Horizon DaaS Input Validation Flaw Lets Remote Users Access Devices and Drives on the Target System - SecurityTracker
-
http://www.vmware.com/security/advisories/VMSA-2017-0002.html
VMSA-2017-0002Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/96559
VMware Horizon DaaS CVE-2017-4897 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
Jump to