Vulnerability Name: | CVE-2020-9497 (CCN-184483) | ||||||||||||
Assigned: | 2020-07-02 | ||||||||||||
Published: | 2020-07-02 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | Apache Guacamole 1.1.0 and older do not properly validate datareceived from RDP servers via static virtual channels. If a userconnects to a malicious or compromised RDP server, specially-craftedPDUs could result in disclosure of information within the memory ofthe guacd process handling the connection. | ||||||||||||
CVSS v3 Severity: | 4.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N) 3.9 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 1.2 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9497 Source: XF Type: UNKNOWN apache-cve20209497-info-disc(184483) Source: CCN Type: Apache Guacamole Web site Apache Guacamole Source: CONFIRM Type: Third Party Advisory https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525 Source: MLIST Type: Mailing List, Vendor Advisory [guacamole-user] 20200703 Re: [SECURITY] CVE-2020-9497: Apache Guacamole: Improper input validation of RDP static virtual channels Source: MLIST Type: Mailing List, Vendor Advisory [announce] 20210223 Re: Apache Software Foundation Security Report: 2020 Source: MLIST Type: Mailing List, Vendor Advisory [guacamole-user] 20200703 RE: [SECURITY] CVE-2020-9497: Apache Guacamole: Improper input validation of RDP static virtual channels Source: MLIST Type: Mailing List, Vendor Advisory [announce] 20200701 [SECURITY] CVE-2020-9497: Apache Guacamole: Improper input validation of RDP static virtual channels Source: CCN Type: Apache Mailing List, 2020/07/02 03:14:11 [SECURITY] CVE-2020-9497: Apache Guacamole: Improper input validation of RDP static virtual channels Source: MISC Type: Mailing List, Vendor Advisory https://lists.apache.org/thread.html/r65f75d3d65d1af68141f42071ebb27dda24af3e45570e593c1dbd81f%40%3Cannounce.guacamole.apache.org%3E Source: MLIST Type: Mailing List, Vendor Advisory [announce] 20210125 Apache Software Foundation Security Report: 2020 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20201106 [SECURITY] [DLA 2435-1] guacamole-server security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-bfde0ab889 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-640645e518 Source: MISC Type: Third Party Advisory https://research.checkpoint.com/2020/apache-guacamole-rce/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||
BACK |