First published: Tue Sep 22 2020(Updated: )
VMware Horizon DaaS (7.x and 8.x before 8.0.1 Update 1) contains a broken authentication vulnerability due to a flaw in the way it handled the first factor authentication. Successful exploitation of this issue may allow an attacker to bypass two-factor authentication process. In order to exploit this issue, an attacker must have a legitimate account on Horizon DaaS.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Horizon DaaS | >=8.0.0<=8.0.1 | |
VMware Horizon DaaS | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-3977.
The severity of CVE-2020-3977 is medium with a CVSS score of 6.5.
VMware Horizon DaaS versions 7.x, 8.0.0, and 8.0.1 (before 8.0.1 Update 1) are affected by CVE-2020-3977.
Successful exploitation of CVE-2020-3977 may allow an attacker to bypass two-factor authentication process.
Yes, VMware has released a fix in the form of VMware Horizon DaaS 8.0.1 Update 1.