First published: Wed Apr 29 2020(Updated: )
In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moonlight | <4.0.1 | |
Moonlight | <4.0.1 |
https://github.com/moonlight-stream/moonlight-ios/commit/b0149b2fe9125a77ee11fe133382673694b6e8cc
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11024 is classified as a medium severity vulnerability due to its potential for a man-in-the-middle attack.
To fix CVE-2020-11024, upgrade Moonlight on iOS or tvOS to version 4.0.1 or later.
CVE-2020-11024 allows an attacker to intercept and manipulate the pairing process of the Moonlight app, potentially compromising sensitive information.
CVE-2020-11024 affects all versions of Moonlight for iOS and tvOS prior to version 4.0.1.
There are no known workarounds for CVE-2020-11024; upgrading to the fixed version is the only solution.