CWE-295
Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.
CVE-2007-5967 (GCVE-0-2007-5967)
Vulnerability from cvelistv5
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Mozilla Firefox |
Version: unknown |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla-dev.allizom.org/show_bug.cgi?id=406724" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mozilla Firefox", "vendor": "n/a", "versions": [ { "status": "affected", "version": "unknown" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw in Mozilla\u0027s embedded certificate code might allow web sites to install root certificates on devices without user approval." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-17T11:50:13", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla-dev.allizom.org/show_bug.cgi?id=406724" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-5967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mozilla Firefox", "version": { "version_data": [ { "version_value": "unknown" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw in Mozilla\u0027s embedded certificate code might allow web sites to install root certificates on devices without user approval." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla-dev.allizom.org/show_bug.cgi?id=406724", "refsource": "MISC", "url": "https://bugzilla-dev.allizom.org/show_bug.cgi?id=406724" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-5967", "datePublished": "2021-05-17T11:50:13", "dateReserved": "2007-11-14T00:00:00", "dateUpdated": "2024-08-07T15:47:00.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0955 (GCVE-0-2012-0955)
Vulnerability from cvelistv5
- CWE-295 - Improper Certificate Validation
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Canonical | software-properties |
Version: 0.92 < 0.92 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:25.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://launchpad.net/bugs/1036839" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://code.launchpad.net/~cyphermox/software-properties/lp1036839/+merge/119753" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "software-properties", "vendor": "Canonical", "versions": [ { "lessThan": "0.92", "status": "affected", "version": "0.92", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Marc Deslauriers" } ], "datePublic": "2012-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "software-properties was vulnerable to a person-in-the-middle attack due to incorrect TLS certificate validation in softwareproperties/ppa.py. software-properties didn\u0027t check TLS certificates under python2 and only checked certificates under python3 if a valid certificate bundle was provided. Fixed in software-properties version 0.92." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-02T00:50:15", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://launchpad.net/bugs/1036839" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://code.launchpad.net/~cyphermox/software-properties/lp1036839/+merge/119753" } ], "source": { "defect": [ "https://launchpad.net/bugs/1036839" ], "discovery": "INTERNAL" }, "title": "software-properties incorrectly validated TLS certificates", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2012-08-14T20:05:00.000Z", "ID": "CVE-2012-0955", "STATE": "PUBLIC", "TITLE": "software-properties incorrectly validated TLS certificates" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "software-properties", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "0.92", "version_value": "0.92" } ] } } ] }, "vendor_name": "Canonical" } ] } }, "configuration": [], "credit": [ { "lang": "eng", "value": "Marc Deslauriers" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "software-properties was vulnerable to a person-in-the-middle attack due to incorrect TLS certificate validation in softwareproperties/ppa.py. software-properties didn\u0027t check TLS certificates under python2 and only checked certificates under python3 if a valid certificate bundle was provided. Fixed in software-properties version 0.92." } ] }, "exploit": [], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.net/bugs/1036839", "refsource": "UBUNTU", "url": "https://launchpad.net/bugs/1036839" }, { "name": "https://code.launchpad.net/~cyphermox/software-properties/lp1036839/+merge/119753", "refsource": "UBUNTU", "url": "https://code.launchpad.net/~cyphermox/software-properties/lp1036839/+merge/119753" } ] }, "solution": [], "source": { "advisory": "", "defect": [ "https://launchpad.net/bugs/1036839" ], "discovery": "INTERNAL" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2012-0955", "datePublished": "2020-12-02T00:50:15.305885Z", "dateReserved": "2012-02-01T00:00:00", "dateUpdated": "2024-09-16T17:14:04.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-10001 (GCVE-0-2013-10001)
Vulnerability from cvelistv5
- CWE-295 - Improper Certificate Validation
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:09:17.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.modzero.ch/modlog/archives/2013/05/28/htcs_e-mail_client_fails_to_verify_server_certificates/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vuldb.com/?id.8900" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2013-10001", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T17:14:59.267706Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T14:40:22.649Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "One", "vendor": "HTC", "versions": [ { "status": "affected", "version": "4.x" } ] }, { "product": "Sense", "vendor": "HTC", "versions": [ { "status": "affected", "version": "4.x" } ] } ], "credits": [ { "lang": "en", "value": "Max Moser/Martin Schobert" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in HTC One/Sense 4.x. It has been rated as problematic. Affected by this issue is the certification validation of the mail client. An exploit has been disclosed to the public and may be used." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-17T07:30:14.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.modzero.ch/modlog/archives/2013/05/28/htcs_e-mail_client_fails_to_verify_server_certificates/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vuldb.com/?id.8900" } ], "title": "HTC One/Sense Mail Client certificate validation", "x_generator": "vuldb.com", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@vuldb.com", "ID": "CVE-2013-10001", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "HTC One/Sense Mail Client certificate validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "One", "version": { "version_data": [ { "version_value": "4.x" } ] } }, { "product_name": "Sense", "version": { "version_data": [ { "version_value": "4.x" } ] } } ] }, "vendor_name": "HTC" } ] } }, "credit": "Max Moser/Martin Schobert", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in HTC One/Sense 4.x. It has been rated as problematic. Affected by this issue is the certification validation of the mail client. An exploit has been disclosed to the public and may be used." } ] }, "generator": "vuldb.com", "impact": { "cvss": { "baseScore": "4.8", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.modzero.ch/modlog/archives/2013/05/28/htcs_e-mail_client_fails_to_verify_server_certificates/", "refsource": "MISC", "url": "http://www.modzero.ch/modlog/archives/2013/05/28/htcs_e-mail_client_fails_to_verify_server_certificates/" }, { "name": "https://vuldb.com/?id.8900", "refsource": "MISC", "url": "https://vuldb.com/?id.8900" } ] } } } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2013-10001", "datePublished": "2022-05-17T07:30:14.000Z", "dateReserved": "2022-05-17T00:00:00.000Z", "dateUpdated": "2025-04-15T14:40:22.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8164 (GCVE-0-2014-8164)
Vulnerability from cvelistv5
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Red Hat CloudForms |
Version: Red Hat CloudForms 5.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151208" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Red Hat CloudForms", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Red Hat CloudForms 5.x" } ] } ], "descriptions": [ { "lang": "en", "value": "A insecure configuration for certificate verification (http.verify_mode = OpenSSL::SSL::VERIFY_NONE) may lead to verification bypass in Red Hat CloudForms 5.x." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T19:06:41", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151208" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8164", "datePublished": "2022-07-06T19:06:41", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:51.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10534 (GCVE-0-2016-10534)
Vulnerability from cvelistv5
- CWE-295 - Improper Certificate Validation ()
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
HackerOne | electron-packager node module |
Version: >= 5.2.1 <= 6.0.0 || >=6.0.0 <= 6.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:21:52.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/electron-userland/electron-packager/issues/333" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nodesecurity.io/advisories/104" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "electron-packager node module", "vendor": "HackerOne", "versions": [ { "status": "affected", "version": "\u003e= 5.2.1 \u003c= 6.0.0 || \u003e=6.0.0 \u003c= 6.0.2" } ] } ], "datePublic": "2018-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "electron-packager is a command line tool that packages Electron source code into `.app` and `.exe` packages. along with Electron. The `--strict-ssl` command line option in electron-packager \u003e= 5.2.1 \u003c= 6.0.0 || \u003e=6.0.0 \u003c= 6.0.2 defaults to false if not explicitly set to true. This could allow an attacker to perform a man in the middle attack." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "Improper Certificate Validation (CWE-295)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-31T19:57:01", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/electron-userland/electron-packager/issues/333" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nodesecurity.io/advisories/104" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "DATE_PUBLIC": "2018-04-26T00:00:00", "ID": "CVE-2016-10534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "electron-packager node module", "version": { "version_data": [ { "version_value": "\u003e= 5.2.1 \u003c= 6.0.0 || \u003e=6.0.0 \u003c= 6.0.2" } ] } } ] }, "vendor_name": "HackerOne" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "electron-packager is a command line tool that packages Electron source code into `.app` and `.exe` packages. along with Electron. The `--strict-ssl` command line option in electron-packager \u003e= 5.2.1 \u003c= 6.0.0 || \u003e=6.0.0 \u003c= 6.0.2 defaults to false if not explicitly set to true. This could allow an attacker to perform a man in the middle attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Certificate Validation (CWE-295)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/electron-userland/electron-packager/issues/333", "refsource": "MISC", "url": "https://github.com/electron-userland/electron-packager/issues/333" }, { "name": "https://nodesecurity.io/advisories/104", "refsource": "MISC", "url": "https://nodesecurity.io/advisories/104" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2016-10534", "datePublished": "2018-05-31T20:00:00Z", "dateReserved": "2017-10-29T00:00:00", "dateUpdated": "2024-09-17T02:37:40.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6562 (GCVE-0-2016-6562)
Vulnerability from cvelistv5
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | ShoreTel | Mobility Client iOS |
Version: 9.1.3.109 < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:28.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.info-sec.ca/advisories/ShoreTel-Mobility.html" }, { "name": "VU#475907", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/475907" }, { "name": "95224", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/95224" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mobility Client iOS", "vendor": "ShoreTel", "versions": [ { "lessThanOrEqual": "9.1.3.109", "status": "affected", "version": "9.1.3.109", "versionType": "custom" } ] }, { "product": "Mobility Client Andoid ", "vendor": "ShoreTel", "versions": [ { "lessThanOrEqual": "9.1.3.109", "status": "affected", "version": "9.1.3.109", "versionType": "custom" } ] } ], "datePublic": "2017-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "On iOS and Android devices, the ShoreTel Mobility Client app version 9.1.3.109 fails to properly validate SSL certificates provided by HTTPS connections, which means that an attacker in the position to perform MITM attacks may be able to obtain sensitive account information such as login credentials." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-13T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.info-sec.ca/advisories/ShoreTel-Mobility.html" }, { "name": "VU#475907", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/475907" }, { "name": "95224", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/95224" } ], "solutions": [ { "lang": "en", "value": "ShoreTel has released version 9.1.5.104 for all devices to address the vulnerability." } ], "source": { "discovery": "UNKNOWN" }, "title": "ShoreTel Mobility Client for iOS and Android, version 9.1.3.109 and earlier, fails to properly validate SSL certificates provided by HTTPS connections", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-6562", "STATE": "PUBLIC", "TITLE": "ShoreTel Mobility Client for iOS and Android, version 9.1.3.109 and earlier, fails to properly validate SSL certificates provided by HTTPS connections" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mobility Client iOS", "version": { "version_data": [ { "affected": "\u003c=", "version_affected": "\u003c=", "version_name": "9.1.3.109", "version_value": "9.1.3.109" } ] } }, { "product_name": "Mobility Client Andoid ", "version": { "version_data": [ { "affected": "\u003c=", "version_affected": "\u003c=", "version_name": "9.1.3.109", "version_value": "9.1.3.109" } ] } } ] }, "vendor_name": "ShoreTel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On iOS and Android devices, the ShoreTel Mobility Client app version 9.1.3.109 fails to properly validate SSL certificates provided by HTTPS connections, which means that an attacker in the position to perform MITM attacks may be able to obtain sensitive account information such as login credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.info-sec.ca/advisories/ShoreTel-Mobility.html", "refsource": "MISC", "url": "https://www.info-sec.ca/advisories/ShoreTel-Mobility.html" }, { "name": "VU#475907", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/475907" }, { "name": "95224", "refsource": "BID", "url": "https://www.securityfocus.com/bid/95224" } ] }, "solution": [ { "lang": "en", "value": "ShoreTel has released version 9.1.5.104 for all devices to address the vulnerability." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-6562", "datePublished": "2018-07-13T20:00:00", "dateReserved": "2016-08-03T00:00:00", "dateUpdated": "2024-08-06T01:36:28.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7075 (GCVE-0-2016-7075)
Vulnerability from cvelistv5
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kubernetes/kubernetes/issues/34517" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7075" }, { "name": "RHSA-2016:2064", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:2064" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenShift", "vendor": "Red Hat", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-10-10T00:00:00", "descriptions": [ { "lang": "en", "value": "It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-11T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kubernetes/kubernetes/issues/34517" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7075" }, { "name": "RHSA-2016:2064", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:2064" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-7075", "datePublished": "2018-09-10T14:00:00", "dateReserved": "2016-08-23T00:00:00", "dateUpdated": "2024-08-06T01:50:47.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-13083 (GCVE-0-2017-13083)
Vulnerability from cvelistv5
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Akeo Consulting | Rufus |
Version: prior to 2.17.1187 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:58:12.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#403768", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/403768" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pbatard/rufus/issues/1009" }, { "name": "100516", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100516" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Rufus", "vendor": "Akeo Consulting", "versions": [ { "status": "affected", "version": "prior to 2.17.1187" } ] } ], "credits": [ { "lang": "en", "value": "Reported by Will Dormann of the CERT/CC" } ], "datePublic": "2017-08-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Akeo Consulting Rufus prior to version 2.17.1187 does not adequately validate the integrity of updates downloaded over HTTP, allowing an attacker to easily convince a user to execute arbitrary code" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation\n", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-494", "description": "CWE-494: Download of Code Without Integrity Check", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347: Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-19T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#403768", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/403768" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pbatard/rufus/issues/1009" }, { "name": "100516", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100516" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb" } ], "workarounds": [ { "lang": "en", "value": "Manually download updates from https://rufus.akeo.ie/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-13083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rufus", "version": { "version_data": [ { "platform": "", "version_value": "prior to 2.17.1187" } ] } } ] }, "vendor_name": "Akeo Consulting" } ] } }, "configuration": [], "credit": [ "Reported by Will Dormann of the CERT/CC" ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Akeo Consulting Rufus prior to version 2.17.1187 does not adequately validate the integrity of updates downloaded over HTTP, allowing an attacker to easily convince a user to execute arbitrary code" } ] }, "exploit": "", "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation\n" } ] }, { "description": [ { "lang": "eng", "value": "CWE-494: Download of Code Without Integrity Check" } ] }, { "description": [ { "lang": "eng", "value": "CWE-345: Insufficient Verification of Data Authenticity" } ] }, { "description": [ { "lang": "eng", "value": "CWE-347: Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "VU#403768", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/403768" }, { "name": "https://github.com/pbatard/rufus/issues/1009", "refsource": "CONFIRM", "url": "https://github.com/pbatard/rufus/issues/1009" }, { "name": "100516", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100516" }, { "name": "https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb", "refsource": "CONFIRM", "url": "https://github.com/pbatard/rufus/commit/c3c39f7f8a11f612c4ebf7affce25ec6928eb1cb" } ] }, "solution": "Upgrade to Akeo Consulting Rufus version 2.17.1187 or later", "work_around": [ { "lang": "en", "value": "Manually download updates from https://rufus.akeo.ie/" } ] } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-13083", "datePublished": "2017-10-18T13:00:00", "dateReserved": "2017-08-22T00:00:00", "dateUpdated": "2024-08-05T18:58:12.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-13105 (GCVE-0-2017-13105)
Vulnerability from cvelistv5
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Hi Security Lab | Virus Cleaner - Antivirus, Booster |
Version: 3.7.1.1329 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:58:12.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#787952", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/787952" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android mobile" ], "product": "Virus Cleaner - Antivirus, Booster", "vendor": "Hi Security Lab", "versions": [ { "status": "affected", "version": "3.7.1.1329" } ] } ], "datePublic": "2018-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Hi Security Virus Cleaner - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication. This opens the application up to a man-in-the-middle attack having all of its encrypted traffic intercepted and read by an attacker." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-15T21:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#787952", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/787952" } ], "source": { "discovery": "UNKNOWN" }, "title": "Hi Security Virus Cleaner - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-13105", "STATE": "PUBLIC", "TITLE": "Hi Security Virus Cleaner - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Virus Cleaner - Antivirus, Booster", "version": { "version_data": [ { "affected": "=", "platform": "Android mobile", "version_affected": "=", "version_name": "3.7.1.1329", "version_value": "3.7.1.1329" } ] } } ] }, "vendor_name": "Hi Security Lab" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hi Security Virus Cleaner - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication. This opens the application up to a man-in-the-middle attack having all of its encrypted traffic intercepted and read by an attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "VU#787952", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/787952" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-13105", "datePublished": "2018-08-15T22:00:00", "dateReserved": "2017-08-22T00:00:00", "dateUpdated": "2024-08-05T18:58:12.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-14806 (GCVE-0-2017-14806)
Vulnerability from cvelistv5
- CWE-295 - Improper Certificate Validation
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
SUSE | Studio onsite |
Version: susestudio-common < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:40.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1065397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Studio onsite", "vendor": "SUSE", "versions": [ { "lessThanOrEqual": "1.3.17-56.6.3", "status": "affected", "version": "susestudio-common", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Johannes Segitz of SUSE" } ], "datePublic": "2020-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:52", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1065397" } ], "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1065397", "defect": [ "1065397" ], "discovery": "INTERNAL" }, "title": "Insecure handling of repodata and packages in SUSE Studio onlite", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "ID": "CVE-2017-14806", "STATE": "PUBLIC", "TITLE": "Insecure handling of repodata and packages in SUSE Studio onlite" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Studio onsite", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "susestudio-common", "version_value": "1.3.17-56.6.3" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "credit": [ { "lang": "eng", "value": "Johannes Segitz of SUSE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1065397", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1065397" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1065397", "defect": [ "1065397" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2017-14806", "datePublished": "2020-01-27T09:45:15.863260Z", "dateReserved": "2017-09-27T00:00:00", "dateUpdated": "2024-09-16T16:48:59.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phases: Architecture and Design, Implementation
Description:
- Certificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.
Mitigation
Phase: Implementation
Description:
- If certificate pinning is being used, ensure that all relevant properties of the certificate are fully validated before the certificate is pinned, including the hostname.
CAPEC-459: Creating a Rogue Certification Authority Certificate
An adversary exploits a weakness resulting from using a hashing algorithm with weak collision resistance to generate certificate signing requests (CSR) that contain collision blocks in their "to be signed" parts. The adversary submits one CSR to be signed by a trusted certificate authority then uses the signed blob to make a second certificate appear signed by said certificate authority. Due to the hash collision, both certificates, though different, hash to the same value and so the signed blob works just as well in the second certificate. The net effect is that the adversary's second X.509 certificate, which the Certification Authority has never seen, is now signed and validated by that Certification Authority.
CAPEC-475: Signature Spoofing by Improper Validation
An adversary exploits a cryptographic weakness in the signature verification algorithm implementation to generate a valid signature without knowing the key.