Описание
An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
Ссылки
- ExploitThird Party Advisory
- Product
- ExploitThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1Версия до 4.0.0.0 (включая)
cpe:2.3:a:remotemouse:emote_remote_mouse:*:*:*:*:*:*:*:*
EPSS
Процентиль: 43%
0.00203
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-319
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
EPSS
Процентиль: 43%
0.00203
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-319