Vulnerability Details : CVE-2020-11024
In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS.
Vulnerability category: Information leak
Products affected by CVE-2020-11024
- cpe:2.3:a:moonlight-stream:moonlight:*:*:*:*:*:tvos:*:*
- cpe:2.3:a:moonlight-stream:moonlight:*:*:*:*:*:iphone_os:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-11024
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-11024
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N |
1.8
|
5.8
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L |
0.3
|
5.3
|
GitHub, Inc. |
CWE ids for CVE-2020-11024
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2020-11024
-
https://github.com/moonlight-stream/moonlight-ios/commit/b0149b2fe9125a77ee11fe133382673694b6e8cc
Merge pull request #405 from loki-47-6F-64/master · moonlight-stream/moonlight-ios@b0149b2 · GitHubPatch;Third Party Advisory
-
https://github.com/moonlight-stream/moonlight-ios/pull/405
Don't send PIN to GFE by loki-47-6F-64 · Pull Request #405 · moonlight-stream/moonlight-ios · GitHubPatch;Third Party Advisory
-
https://github.com/moonlight-stream/moonlight-ios/security/advisories/GHSA-g298-gp8q-h6j3
Moonlight iOS/tvOS pairing process is vulnerable to man-in-the-middle attack · Advisory · moonlight-stream/moonlight-ios · GitHubThird Party Advisory
Jump to