Vulnerability Details : CVE-2020-15959
Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
Products affected by CVE-2020-15959
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
- cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15959
0.57%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15959
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST |
References for CVE-2020-15959
-
https://crbug.com/1122684
Inloggen - Google AccountsPermissions Required;Vendor Advisory
-
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
Chrome Releases: Stable Channel Update for DesktopRelease Notes;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html
[security-announce] openSUSE-SU-2020:1499-1: important: Security updateMailing List;Third Party Advisory
-
https://www.debian.org/security/2021/dsa-4824
Debian -- Security Information -- DSA-4824-1 chromiumThird Party Advisory
-
https://security.gentoo.org/glsa/202101-30
Qt WebEngine: Multiple vulnerabilities (GLSA 202101-30) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNIYFJST4TFJYFZ27VODBOINCLBGULTD/
[SECURITY] Fedora 33 Update: chromium-85.0.4183.121-1.fc33 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FN7HZIGAOCZKBT4LV363BCPRA5FLY25I/
[SECURITY] Fedora 31 Update: chromium-85.0.4183.121-1.fc31 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00049.html
[security-announce] openSUSE-SU-2020:1713-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html
[security-announce] openSUSE-SU-2020:1510-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html
[security-announce] openSUSE-SU-2020:1514-1: important: Security updateMailing List;Third Party Advisory
Jump to