Broken Access Control in VMware AirWatch Console
CVE-2017-4942

4.9MEDIUM

Key Information:

Vendor
Vmware
Vendor
CVE Published:
13 December 2017

Summary

The VMware AirWatch Console (AWC) suffers from a Broken Access Control vulnerability that may allow unauthorized administrators to access sensitive end-user device details. This flaw can facilitate potential data exposure, compromising the confidentiality of devices managed through the platform. To mitigate risks associated with this vulnerability, it is essential for users and administrators to apply the necessary security patches and remain aware of the best practices for access control.

Affected Version(s)

Airwatch Console Any

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.