Broken Access Control in VMware AirWatch Console
CVE-2017-4942
4.9MEDIUM
Summary
The VMware AirWatch Console (AWC) suffers from a Broken Access Control vulnerability that may allow unauthorized administrators to access sensitive end-user device details. This flaw can facilitate potential data exposure, compromising the confidentiality of devices managed through the platform. To mitigate risks associated with this vulnerability, it is essential for users and administrators to apply the necessary security patches and remain aware of the best practices for access control.
Affected Version(s)
Airwatch Console Any
References
CVSS V3.1
Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved