In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS.
References
Link | Resource |
---|---|
https://github.com/moonlight-stream/moonlight-ios/pull/405 | Patch Third Party Advisory |
https://github.com/moonlight-stream/moonlight-ios/security/advisories/GHSA-g298-gp8q-h6j3 | Third Party Advisory |
https://github.com/moonlight-stream/moonlight-ios/commit/b0149b2fe9125a77ee11fe133382673694b6e8cc | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-04-29 14:15
Updated : 2021-10-26 13:01
NVD link : CVE-2020-11024
Mitre link : CVE-2020-11024
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
moonlight-stream
- moonlight