Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-14899
Analyzed
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-11 Dec, 2019 | 15:15
Updated At-01 Mar, 2023 | 16:40

A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.4HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Secondary3.07.4HIGH
CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Primary2.04.9MEDIUM
AV:A/AC:M/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.9
Base severity: MEDIUM
Vector:
AV:A/AC:M/Au:S/C:P/I:P/A:P
CPE Matches

FreeBSD Foundation
freebsd
>>freebsd>>-
cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>-
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
OpenBSD
openbsd
>>openbsd>>-
cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*
Apple Inc.
apple
>>ipados>>Versions before 13.6(exclusive)
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>Versions before 13.6(exclusive)
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>mac_os_x>>Versions before 10.15.6(exclusive)
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>11.0
cpe:2.3:o:apple:macos:11.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>tvos>>Versions before 13.4.8(exclusive)
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-300Primarysecalert@redhat.com
NVD-CWE-OtherSecondarynvd@nist.gov
CWE ID: CWE-300
Type: Primary
Source: secalert@redhat.com
CWE ID: NVD-CWE-Other
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/fulldisclosure/2020/Dec/32secalert@redhat.com
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Jul/23secalert@redhat.com
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Jul/24secalert@redhat.com
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Jul/25secalert@redhat.com
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/08/13/2secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/10/07/3secalert@redhat.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/07/05/1secalert@redhat.com
Mailing List
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899secalert@redhat.com
Issue Tracking
Third Party Advisory
https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/secalert@redhat.com
Third Party Advisory
https://support.apple.com/kb/HT211288secalert@redhat.com
Third Party Advisory
https://support.apple.com/kb/HT211289secalert@redhat.com
Third Party Advisory
https://support.apple.com/kb/HT211290secalert@redhat.com
Third Party Advisory
https://support.apple.com/kb/HT211850secalert@redhat.com
Third Party Advisory
https://support.apple.com/kb/HT211931secalert@redhat.com
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Dec/32
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Jul/23
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Jul/24
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Jul/25
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Nov/20
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2020/08/13/2
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2020/10/07/3
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2021/07/05/1
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14899
Source: secalert@redhat.com
Resource:
Issue Tracking
Third Party Advisory
Hyperlink: https://openvpn.net/security-advisory/no-flaws-found-in-openvpn-software/
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT211288
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT211289
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT211290
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT211850
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT211931
Source: secalert@redhat.com
Resource:
Third Party Advisory
Change History
0Changes found

Details not found