Vulnerability Name: | CVE-2018-6608 (CCN-141091) | ||||||||||||
Assigned: | 2018-02-04 | ||||||||||||
Published: | 2018-02-04 | ||||||||||||
Updated: | 2018-04-23 | ||||||||||||
Summary: | In the WebRTC component in Opera 51.0.2830.55, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request. | ||||||||||||
CVSS v3 Severity: | 4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) 3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-6608 Source: MISC Type: Third Party Advisory https://docs.google.com/spreadsheets/d/1Nm7mxfFvmdn-3Az-BtE5O0BIdbJiIAWUnkoAF_v_0ug/edit?usp=sharing Source: XF Type: UNKNOWN opera-cve20186608-info-disc(141091) Source: CCN Type: WebRTC-Leak GIT Repository Check if your VPN leaks your IP address via the WebRTC technology Source: MISC Type: Third Party Advisory https://github.com/VoidSec/WebRTC-Leak Source: MISC Type: Issue Tracking https://news.ycombinator.com/item?id=16699270 Source: MISC Type: Third Party Advisory https://voidsec.com/vpn-leak/ Source: MISC Type: Third Party Advisory https://www.bleepingcomputer.com/news/security/many-vpn-providers-leak-customers-ip-address-via-webrtc-bug/ Source: CCN Type: Opera Web site Fast, secure, easy-to-use browser | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |