CVE-2018-6979

The VMware Workspace ONE Unified Endpoint Management Console (A/W Console) 9.7.x prior to 9.7.0.3, 9.6.x prior to 9.6.0.7, 9.5.x prior to 9.5.0.16, 9.4.x prior to 9.4.0.22, 9.3.x prior to 9.3.0.25, 9.2.x prior to 9.2.3.27, and 9.1.x prior to 9.1.5.6 contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. This vulnerability may allow for a malicious actor to impersonate an authorized SAML session if certificate-based authentication is enabled. This vulnerability is also relevant if certificate-based authentication is not enabled, but the outcome of exploitation is limited to an information disclosure (Important Severity) in those cases.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
vmwareCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 51%
VendorProductVersion
vmwareairwatch_console
9.1.0.0 ≤
𝑥
< 9.1.5.6
vmwareairwatch_console
9.2.0.0 ≤
𝑥
< 9.2.3.27
vmwareairwatch_console
9.3.0.0 ≤
𝑥
< 9.3.0.25
vmwareairwatch_console
9.4.0.0 ≤
𝑥
< 9.4.0.22
vmwareairwatch_console
9.5.0.0 ≤
𝑥
< 9.5.0.16
vmwareairwatch_console
9.6.0.0 ≤
𝑥
< 9.6.0.7
vmwareairwatch_console
9.7.0.0 ≤
𝑥
< 9.7.0.3
𝑥
= Vulnerable software versions