First published: Fri Jul 06 2018(Updated: )
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology SSL VPN Client | <1.2.4-0224 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-8929.
The title of this vulnerability is 'Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224'.
The description of this vulnerability is 'Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.'
The severity of CVE-2018-8929 is high, with a severity value of 8.1.
To fix CVE-2018-8929, it is recommended to update your Synology SSL VPN Client to version 1.2.4-0224 or later.