synology ssl-vpn-client CVE-2018-13283 is a vulnerability in Synology Ssl Vpn Client
Published on April 1, 2019

Lack of administrator control over security vulnerability in client.cgi in Synology SSL VPN Client before 1.2.5-0226 allows remote attackers to conduct man-in-the-middle attacks via the (1) command, (2) hostname, or (3) port parameter.

NVD

Weakness Type

Lack of Administrator Control over Security

The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect the environment in which the product is being used. This introduces resultant weaknesses or prevents it from operating at a level of security that is desired by the administrator. If the product's administrator does not have the ability to manage security-related decisions at all times, then protecting the product from outside threats - including the product's developer - can become impossible. For example, a hard-coded account name and password cannot be changed by the administrator, thus exposing that product to attacks that the administrator can not prevent.


Products Associated with CVE-2018-13283

Want to know whenever a new CVE is published for Synology Ssl Vpn Client? stack.watch will email you.

 

Affected Versions

Synology SSL VPN Client:

Exploit Probability

EPSS
0.22%
Percentile
44.82%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.