Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-11506

Summary
Assigner-tenable
Assigner Org ID-5ac1ecc2-367a-4d16-a0b2-35d495ddd0be
Published At-09 Aug, 2017 | 12:00
Updated At-17 Sep, 2024 | 03:34
Rejected At-
Credits

When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x before 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:tenable
Assigner Org ID:5ac1ecc2-367a-4d16-a0b2-35d495ddd0be
Published At:09 Aug, 2017 | 12:00
Updated At:17 Sep, 2024 | 03:34
Rejected At:
▼CVE Numbering Authority (CNA)

When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x before 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.

Affected Products
Vendor
Tenable, Inc.Tenable
Product
Nessus
Versions
Affected
  • 6.x before 6.11
Problem Types
TypeCWE IDDescription
textN/AMan-in-the-Middle
Type: text
CWE ID: N/A
Description: Man-in-the-Middle
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tenable.com/security/tns-2017-11
x_refsource_CONFIRM
http://www.securitytracker.com/id/1039141
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.tenable.com/security/tns-2017-11
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1039141
Resource:
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tenable.com/security/tns-2017-11
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1039141
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.tenable.com/security/tns-2017-11
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1039141
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:vulnreport@tenable.com
Published At:09 Aug, 2017 | 12:29
Updated At:20 Apr, 2025 | 01:37

When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x before 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.4HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.0
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

Tenable, Inc.
tenable
>>nessus>>6.0.0
cpe:2.3:a:tenable:nessus:6.0.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.0.1
cpe:2.3:a:tenable:nessus:6.0.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.0.2
cpe:2.3:a:tenable:nessus:6.0.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.1.0
cpe:2.3:a:tenable:nessus:6.1.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.1.1
cpe:2.3:a:tenable:nessus:6.1.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.1.2
cpe:2.3:a:tenable:nessus:6.1.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.2.0
cpe:2.3:a:tenable:nessus:6.2.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.2.1
cpe:2.3:a:tenable:nessus:6.2.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.0
cpe:2.3:a:tenable:nessus:6.3.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.1
cpe:2.3:a:tenable:nessus:6.3.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.2
cpe:2.3:a:tenable:nessus:6.3.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.3
cpe:2.3:a:tenable:nessus:6.3.3:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.4
cpe:2.3:a:tenable:nessus:6.3.4:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.5
cpe:2.3:a:tenable:nessus:6.3.5:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.6
cpe:2.3:a:tenable:nessus:6.3.6:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.3.7
cpe:2.3:a:tenable:nessus:6.3.7:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.4.0
cpe:2.3:a:tenable:nessus:6.4.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.4.1
cpe:2.3:a:tenable:nessus:6.4.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.4.2
cpe:2.3:a:tenable:nessus:6.4.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.4.3
cpe:2.3:a:tenable:nessus:6.4.3:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.0
cpe:2.3:a:tenable:nessus:6.5.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.1
cpe:2.3:a:tenable:nessus:6.5.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.2
cpe:2.3:a:tenable:nessus:6.5.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.3
cpe:2.3:a:tenable:nessus:6.5.3:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.4
cpe:2.3:a:tenable:nessus:6.5.4:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.5
cpe:2.3:a:tenable:nessus:6.5.5:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.5.6
cpe:2.3:a:tenable:nessus:6.5.6:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.6.0
cpe:2.3:a:tenable:nessus:6.6.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.6.1
cpe:2.3:a:tenable:nessus:6.6.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.6.2
cpe:2.3:a:tenable:nessus:6.6.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.7.0
cpe:2.3:a:tenable:nessus:6.7.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.8.0
cpe:2.3:a:tenable:nessus:6.8.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.8.1
cpe:2.3:a:tenable:nessus:6.8.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.9.0
cpe:2.3:a:tenable:nessus:6.9.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.9.1
cpe:2.3:a:tenable:nessus:6.9.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.9.2
cpe:2.3:a:tenable:nessus:6.9.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.9.3
cpe:2.3:a:tenable:nessus:6.9.3:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.0
cpe:2.3:a:tenable:nessus:6.10.0:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.1
cpe:2.3:a:tenable:nessus:6.10.1:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.2
cpe:2.3:a:tenable:nessus:6.10.2:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.3
cpe:2.3:a:tenable:nessus:6.10.3:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.4
cpe:2.3:a:tenable:nessus:6.10.4:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.5
cpe:2.3:a:tenable:nessus:6.10.5:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.6
cpe:2.3:a:tenable:nessus:6.10.6:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.7
cpe:2.3:a:tenable:nessus:6.10.7:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.8
cpe:2.3:a:tenable:nessus:6.10.8:*:*:*:*:*:*:*
Tenable, Inc.
tenable
>>nessus>>6.10.9
cpe:2.3:a:tenable:nessus:6.10.9:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarynvd@nist.gov
CWE ID: CWE-295
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securitytracker.com/id/1039141vulnreport@tenable.com
Third Party Advisory
VDB Entry
https://www.tenable.com/security/tns-2017-11vulnreport@tenable.com
Vendor Advisory
http://www.securitytracker.com/id/1039141af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.tenable.com/security/tns-2017-11af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id/1039141
Source: vulnreport@tenable.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.tenable.com/security/tns-2017-11
Source: vulnreport@tenable.com
Resource:
Vendor Advisory
Hyperlink: http://www.securitytracker.com/id/1039141
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.tenable.com/security/tns-2017-11
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

120Records found

CVE-2013-7201
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.90% / 74.74%
||
7 Day CHG~0.00%
Published-27 Apr, 2018 | 16:00
Updated-06 Aug, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebHybridClient.java in PayPal 5.3 and earlier for Android ignores SSL errors, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.

Action-Not Available
Vendor-paypaln/a
Product-paypaln/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2014-0363
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-5.8||MEDIUM
EPSS-2.82% / 85.59%
||
7 Day CHG~0.00%
Published-30 Apr, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ServerTrustManager component in the Ignite Realtime Smack XMPP API before 4.0.0-rc1 does not verify basicConstraints and nameConstraints in X.509 certificate chains from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate chain.

Action-Not Available
Vendor-igniterealtimen/a
Product-smackn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-2253
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 8.88%
||
7 Day CHG~0.00%
Published-16 Sep, 2020 | 13:20
Updated-04 Aug, 2024 | 07:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.

Action-Not Available
Vendor-Jenkins
Product-email_extensionJenkins Email Extension Plugin
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-1887
Matching Score-4
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-4
Assigner-Meta Platforms, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.11% / 30.04%
||
7 Day CHG~0.00%
Published-12 Mar, 2020 | 23:50
Updated-04 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.

Action-Not Available
Vendor-The Linux FoundationFacebook
Product-osqueryOsquery
CWE ID-CWE-297
Improper Validation of Certificate with Host Mismatch
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-15784
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.4||HIGH
EPSS-0.09% / 27.03%
||
7 Day CHG~0.00%
Published-18 Jan, 2019 | 22:00
Updated-16 Sep, 2024 | 22:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DSA-2019-001: Dell Networking OS10 Improper Certificate Validation Vulnerability

Dell Networking OS10 versions prior to 10.4.3.0 contain a vulnerability in the Phone Home feature which does not properly validate the server's certificate authority during TLS handshake. Use of an invalid or malicious certificate could potentially allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack.

Action-Not Available
Vendor-Dell Inc.
Product-networking_os10Dell Networking OS10
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-1509
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.7||LOW
EPSS-0.11% / 30.32%
||
7 Day CHG~0.00%
Published-02 Oct, 2018 | 15:00
Updated-17 Sep, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Guardium EcoSystem 10.5 does not validate, or incorrectly validates, a certificate.This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host. IBM X-Force ID: 141417.

Action-Not Available
Vendor-IBM Corporation
Product-security_guardiumSecurity Guardium
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-11775
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.4||HIGH
EPSS-0.71% / 71.44%
||
7 Day CHG+0.05%
Published-10 Sep, 2018 | 20:00
Updated-16 Sep, 2024 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.

Action-Not Available
Vendor-The Apache Software FoundationOracle Corporation
Product-enterprise_repositoryflexcube_private_bankingactivemqApache ActiveMQ
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-1000605
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.04% / 11.92%
||
7 Day CHG~0.00%
Published-26 Jun, 2018 | 17:00
Updated-16 Sep, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A man in the middle vulnerability exists in Jenkins CollabNet Plugin 2.0.4 and earlier in CollabNetApp.java, CollabNetPlugin.java, CNFormFieldValidator.java that allows attackers to impersonate any service that Jenkins connects to.

Action-Not Available
Vendor-n/aJenkins
Product-collabnetn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-32069
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.16% / 37.60%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 15:37
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data.

Action-Not Available
Vendor-n/aMitel Networks Corp.
Product-micollabn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-0334
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 23.29%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 21:00
Updated-29 Nov, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the certificate management subsystem of Cisco AnyConnect Network Access Manager and of Cisco AnyConnect Secure Mobility Client for iOS, Mac OS X, Android, Windows, and Linux could allow an unauthenticated, remote attacker to bypass the TLS certificate check when downloading certain configuration files. The vulnerability is due to improper use of Simple Certificate Enrollment Protocol and improper server certificate validation. An attacker could exploit this vulnerability by preparing malicious profile and localization files for Cisco AnyConnect to use. A successful exploit could allow the attacker to remotely change the configuration profile, a certificate, or the localization data used by AnyConnect Secure Mobility Client. Cisco Bug IDs: CSCvh23141.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-anyconnect_secure_mobility_clientCisco AnyConnect Secure Mobility Client unknown
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-0553
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.4||HIGH
EPSS-0.12% / 31.21%
||
7 Day CHG~0.00%
Published-09 Apr, 2018 | 13:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The iRemoconWiFi App for Android version 4.1.7 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Action-Not Available
Vendor-glamoGlamo Inc.
Product-iremocon_wifiiRemoconWiFi App for Android
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-5824
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.8||MEDIUM
EPSS-0.15% / 36.67%
||
7 Day CHG~0.00%
Published-04 Nov, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trillian 5.1.0.19 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, a different vulnerability than CVE-2009-4831.

Action-Not Available
Vendor-cerulean_studiosn/a
Product-trilliann/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-32581
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.15% / 36.83%
||
7 Day CHG~0.00%
Published-05 Aug, 2021 | 19:19
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.

Action-Not Available
Vendor-n/aAcronis (Acronis International GmbH)
Product-cyber_protection_agentcyber_protect_cloudtrue_imagen/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2012-5821
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.24% / 46.66%
||
7 Day CHG~0.00%
Published-04 Nov, 2012 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.

Action-Not Available
Vendor-lynxn/aCanonical Ltd.
Product-lynxubuntu_linuxn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-1277
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.12% / 30.93%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:56
Updated-12 Nov, 2024 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager Certificate Validation Vulnerabilities

Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-5909
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.18%
||
7 Day CHG~0.00%
Published-02 Jul, 2020 | 12:26
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.

Action-Not Available
Vendor-n/aF5, Inc.
Product-nginx_controllerNGINX Controller
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-5684
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.10% / 28.29%
||
7 Day CHG~0.00%
Published-24 Dec, 2020 | 01:20
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

iSM client versions from V5.1 prior to V12.1 running on NEC Storage Manager or NEC Storage Manager Express does not verify a server certificate properly, which allows a man-in-the-middle attacker to eavesdrop on an encrypted communication or alter the communication via a crafted certificate.

Action-Not Available
Vendor-NEC Corporation
Product-ism_serverm320fm120m12em320Management software for NEC Storage disk array system
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-3994
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.4||HIGH
EPSS-0.13% / 32.74%
||
7 Day CHG~0.00%
Published-20 Oct, 2020 | 16:14
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware vCenter Server (6.7 before 6.7u3, 6.6 before 6.5u3k) contains a session hijack vulnerability in the vCenter Server Appliance Management Interface update function due to a lack of certificate validation. A malicious actor with network positioning between vCenter Server and an update repository may be able to perform a session hijack when the vCenter Server Appliance Management Interface is used to download vCenter updates.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_servercloud_foundationvCenter Server
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-3155
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.25% / 48.09%
||
7 Day CHG~0.00%
Published-04 Mar, 2020 | 18:40
Updated-15 Nov, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Intelligent Proximity SSL Certificate Validation Vulnerability

A vulnerability in the SSL implementation of the Cisco Intelligent Proximity solution could allow an unauthenticated, remote attacker to view or alter information shared on Cisco Webex video devices and Cisco collaboration endpoints if the products meet the conditions described in the Vulnerable Products section. The vulnerability is due to a lack of validation of the SSL server certificate received when establishing a connection to a Cisco Webex video device or a Cisco collaboration endpoint. An attacker could exploit this vulnerability by using man in the middle (MITM) techniques to intercept the traffic between the affected client and an endpoint, and then using a forged certificate to impersonate the endpoint. Depending on the configuration of the endpoint, an exploit could allow the attacker to view presentation content shared on it, modify any content being presented by the victim, or have access to call controls. This vulnerability does not affect cloud registered collaboration endpoints.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-jabbermeetingtelepresence_codec_c90intelligence_proximitytelepresence_codec_c90_firmwarewebex_teamstelepresence_codec_c60telepresence_codec_c40telepresence_codec_c60_firmwaretelepresence_codec_c40_firmwarewebex_meetingsCisco Jabber IM for Android
CWE ID-CWE-295
Improper Certificate Validation
CVE-2019-7615
Matching Score-4
Assigner-Elastic
ShareView Details
Matching Score-4
Assigner-Elastic
CVSS Score-7.4||HIGH
EPSS-0.14% / 34.12%
||
7 Day CHG~0.00%
Published-30 Jul, 2019 | 21:15
Updated-04 Aug, 2024 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TLS certificate validation flaw was found in Elastic APM agent for Ruby versions before 2.9.0. When specifying a trusted server CA certificate via the 'server_ca_cert' setting, the Ruby agent would not properly verify the certificate returned by the APM server. This could result in a man in the middle style attack against the Ruby agent.

Action-Not Available
Vendor-Elasticsearch BV
Product-apm-agent-rubyElastic APM agent for Ruby
CWE ID-CWE-295
Improper Certificate Validation
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found