CVE-2020-11024

Published at:
2020-04-29T21:15:11.807

Global infos:

In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS.

CVE Status: Modified

References:

  • [email protected]
  • [email protected]
  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityHIGH
    Attack VectorPHYSICAL
    Availability ImpactLOW
    Base Score6.1
    Base SeverityMEDIUM
    Confidentiality ImpactHIGH
    Integrity ImpactLOW
    Privileges RequiredLOW
    ScopeCHANGED
    User InteractionREQUIRED
    Vector StringCVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L
    Exploitability Score0.3
    Impact Score5.3
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github