OAuth Session Fixation Vulnerability in Mozilla VPN Products
CVE-2020-15679
7.6HIGH
Key Information:
- Vendor
Mozilla
- Vendor
- CVE Published:
- 22 December 2022
What is CVE-2020-15679?
An OAuth session fixation vulnerability exists within the login flow of Mozilla VPN, enabling malicious actors to craft a deceptive login URL. When a victim logs in through this manipulated link, the attacker can gain authenticated access, provided both parties share the same source IP. This could permit attackers to monitor session states or terminate the victim's VPN sessions, compromising user security and privacy.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Mozilla VPN Android 1.1.0 < unspecified
Mozilla VPN iOS 1.0.7 < unspecified
Mozilla VPN Windows < 1.2.2
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved