CVE-2016-7191
high-risk
Published 2016-09-28
The Microsoft Azure Active Directory Passport (aka Passport-Azure-AD) library 1.x before 1.4.6 and 2.x before 2.0.1 for Node.js does not recognize the validateIssuer setting, which allows remote attackers to bypass authentication via a crafted token.
Do I need to act?
~
3.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (18)
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Azure Active Directory Passport
Affected Vendors
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/93213
Mitigation
https://support.microsoft.com/kb/3187742
Third Party Advisory
http://www.securityfocus.com/bid/93213
Mitigation
https://support.microsoft.com/kb/3187742
50
/ 100
high-risk
Severity
24/34 · High
Exploitability
7/34 · Low
Exposure
19/34 · Moderate