Common Weakness Enumeration (CWE) is a category system for software weaknesses
How to fix?
Upgrade wdm to version 0.1.1 or higher.
Overview
wdm is a library which can be used to monitor directories for changes. It's mostly implemented in C and uses the Win32 API for a better performance.
Affected versions of the package are vulnerable to Man-in-the-Middle (MitM).
You can read more about Man-in-the-Middle (MitM) on our blog.
The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).
Network
Attack Complexity (AC)
A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.
High
Privileges Required (PR)
The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
None
User Interaction (UI)
Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.
Required
Scope (S)
An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority.
Unchanged
Confidentiality (C)
There is a total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.
High
Integrity (I)
There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component.
High
Availability (A)
There is no impact to availability within the impacted component.