{ "CVE_data_meta" : { "ASSIGNER" : "security@synology.com", "DATE_PUBLIC" : "2018-07-06T00:00:00", "ID" : "CVE-2018-8929", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "SSL VPN Client", "version" : { "version_data" : [ { "affected" : "<", "version_value" : "1.2.4-0224" } ] } } ] }, "vendor_name" : "Synology" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload." } ] }, "impact" : { "cvss" : { "attackComplexity" : "LOW", "attackVector" : "NETWORK", "availabilityImpact" : "LOW", "baseScore" : 7.3, "baseSeverity" : "MEDIUM", "confidentialityImpact" : "NONE", "integrityImpact" : "LOW", "privilegesRequired" : "LOW", "scope" : "UNCHANGED", "userInteraction" : "NONE", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version" : "3.0" } }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "Improper Restriction of Communication Channel to Intended Endpoints (CWE-923)" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://www.synology.com/en-global/support/security/Synology_SA_18_19", "refsource" : "CONFIRM", "url" : "https://www.synology.com/en-global/support/security/Synology_SA_18_19" } ] } }