5.5
CVSSv3

CVE-2023-4104

Published: 11/09/2023 Updated: 13/09/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups. *This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN client for Linux < v2.16.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla vpn

Vendor Advisories

Debian Bug report logs - #1043004 mozillavpn: CVE-2023-4104 Package: src:mozillavpn; Maintainer for src:mozillavpn is Sylvestre Ledru &lt;sylvestre@debianorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Fri, 4 Aug 2023 05:27:01 UTC Severity: grave Tags: security, upstream Found in version mozillavpn/ ...
Mozilla Foundation Security Advisory 2023-39 Security Issues in Mozilla VPN for Linux prior to v2161 Announced August 30, 2023 Impact moderate Products Mozilla VPN client for Linux in Fixed in Mozilla ...

Recent Articles

Alarm raised over Mozilla VPN: Wonky authorization check lets users cause havoc
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources SUSE security engineer goes public on unfixed problem after disclosure drama

A security engineer at Linux distro maker SUSE has published an advisory for a flaw in the Mozilla VPN client for Linux that has yet to be addressed in a publicly released fix because the disclosure process went off the rails. In a post to the Openwall security mailing list, Matthias Gerstner describes a broken authentication check in Mozilla VPN client v2.14.1, released on May 30. Essentially, the client can be exploited by any user on a system to, among other things, configure their own arbitr...