{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45407","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-08-28T20:21:32.804Z","datePublished":"2024-09-10T15:13:20.126Z","dateUpdated":"2024-09-10T16:12:18.563Z"},"containers":{"cna":{"title":"Sunshine has incorrect state management during pairing process may lead to incorrectly authorized client","problemTypes":[{"descriptions":[{"cweId":"CWE-300","lang":"en","description":"CWE-300: Channel Accessible by Non-Endpoint","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/LizardByte/Sunshine/security/advisories/GHSA-jqph-8cp5-g874","tags":["x_refsource_CONFIRM"],"url":"https://github.com/LizardByte/Sunshine/security/advisories/GHSA-jqph-8cp5-g874"},{"name":"https://github.com/LizardByte/Sunshine/commit/5fcd07ecb1428bfe245ad6fa349aead476c7e772","tags":["x_refsource_MISC"],"url":"https://github.com/LizardByte/Sunshine/commit/5fcd07ecb1428bfe245ad6fa349aead476c7e772"},{"name":"https://github.com/LizardByte/Sunshine/commit/fd7e68457a134102d1b30af5796c79f2aa623224","tags":["x_refsource_MISC"],"url":"https://github.com/LizardByte/Sunshine/commit/fd7e68457a134102d1b30af5796c79f2aa623224"}],"affected":[{"vendor":"LizardByte","product":"Sunshine","versions":[{"version":">= 5fcd07ecb1428bfe245ad6fa349aead476c7e772, < fd7e68457a134102d1b30af5796c79f2aa623224","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-09-10T15:13:20.126Z"},"descriptions":[{"lang":"en","value":"Sunshine is a self-hosted game stream host for Moonlight. Clients that experience a MITM attack during the pairing process may inadvertantly allow access to an unintended client rather than failing authentication due to a PIN validation error. The pairing attempt fails due to the incorrect PIN, but the certificate from the forged pairing attempt is incorrectly persisted prior to the completion of the pairing request. This allows access to the certificate belonging to the attacker."}],"source":{"advisory":"GHSA-jqph-8cp5-g874","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-10T16:12:07.341939Z","id":"CVE-2024-45407","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-10T16:12:18.563Z"}}]}}