First published: Sun Mar 31 2019(Updated: )
Lack of administrator control over security vulnerability in client.cgi in Synology SSL VPN Client before 1.2.5-0226 allows remote attackers to conduct man-in-the-middle attacks via the (1) command, (2) hostname, or (3) port parameter.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology SSL VPN Client | <1.2.5-0226 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13283 is a vulnerability in the Synology SSL VPN Client that allows remote attackers to conduct man-in-the-middle attacks via several parameters.
The severity of CVE-2018-13283 is rated as high with a CVSS score of 7.4.
CVE-2018-13283 affects Synology SSL VPN Client version 1.2.5-0226 and earlier, allowing remote attackers to conduct man-in-the-middle attacks.
Yes, a fix is available for CVE-2018-13283. Users should update to version 1.2.5-0226 of Synology SSL VPN Client.
More information about CVE-2018-13283 can be found in the Synology security advisory Synology_SA_18_30.