First published: Thu Mar 12 2020(Updated: )
Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Osquery | >2.9.0<4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1887 is a vulnerability in osquery versions after 2.9.0 and before 4.2.0 that could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
The severity of CVE-2020-1887 is critical with a CVSS score of 9.1.
CVE-2020-1887 impacts osquery by allowing an attacker to potentially intercept and manipulate osquery traffic.
To fix CVE-2020-1887, update your osquery version to 4.2.0 or above.
You can find more information about CVE-2020-1887 on the GitHub pull request and the Facebook security advisory.