Description
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-20537 | Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload. |
References
History
No history.
Status: PUBLISHED
Assigner: synology
Published:
Updated: 2024-09-16T20:41:43.731Z
Reserved: 2018-03-22T00:00:00.000Z
Link: CVE-2018-8929
No data.
Status : Modified
Published: 2018-07-06T12:29:00.210
Modified: 2024-11-21T04:14:37.470
Link: CVE-2018-8929
No data.
OpenCVE Enrichment
No data.
EUVD