Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-10185

Опубликовано: 05 мар. 2020
Источник: debian
EPSS Низкий

Описание

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
yubikey-valremovedpackage
yubikey-valno-dsabusterpackage
yubikey-valno-dsastretchpackage

Примечания

  • https://www.yubico.com/support/security-advisories/ysa-2020-01/

  • https://github.com/Yubico/yubikey-val/commit/d0e4db3245deb5ce0c8d7d26069c78071a140286

EPSS

Процентиль: 69%
0.00589
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
почти 6 лет назад

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

CVSS3: 8.6
nvd
почти 6 лет назад

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

github
больше 3 лет назад

The sync endpoint in YubiKey Validation Server before 2.40 allows remote attackers to replay an OTP. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service with a non-default configuration such as an open sync pool; the issue does NOT affect YubiCloud.

EPSS

Процентиль: 69%
0.00589
Низкий