CVE-2020-15679

HIGH

Mozilla VPN <1.2.2 - Session Fixation

Title source: llm
STIX 2.1

Description

An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360).

Scores

CVSS v3 7.6
EPSS 0.0058
EPSS Percentile 68.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-384
Status published
Products (4)
mozilla/vpn < 1.0.7_\(929\)
mozilla/vpn < 1.2.2
mozilla/vpn 1.0.7 - 1.0.7_\(929\)
mozilla/vpn 1.1.0 - 1.1.0_\(1360\)
Published Dec 22, 2022
Tracked Since Feb 18, 2026