Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-19072 | Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal | Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: duo
Published:
Updated: 2024-08-05T06:24:11.848Z
Reserved: 2018-02-22T00:00:00.000Z
Link: CVE-2018-7340
No data.
Status : Modified
Published: 2019-04-17T15:29:00.640
Modified: 2024-11-21T04:12:03.410
Link: CVE-2018-7340
No data.
OpenCVE Enrichment
No data.
EUVD