Description
An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360).
References (4)
Scores
CVSS v3
7.6
EPSS
0.0058
EPSS Percentile
68.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-384
Status
published
Products (4)
mozilla/vpn
< 1.0.7_\(929\)
mozilla/vpn
< 1.2.2
mozilla/vpn
1.0.7 - 1.0.7_\(929\)
mozilla/vpn
1.1.0 - 1.1.0_\(1360\)
Published
Dec 22, 2022
Tracked Since
Feb 18, 2026