Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-5383

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-07 Aug, 2018 | 21:00
Updated At-16 Sep, 2024 | 20:36
Rejected At-
Credits

Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:07 Aug, 2018 | 21:00
Updated At:16 Sep, 2024 | 20:36
Rejected At:
▼CVE Numbering Authority (CNA)
Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.

Affected Products
Vendor
Apple Inc.Apple
Product
macOS
Versions
Affected
  • From 10.13 High Sierra before 10.13.6 (custom)
Vendor
Apple Inc.Apple
Product
iOS
Versions
Affected
  • From 11 before 11.4 (custom)
Vendor
AndroidAndroid Open Source Project
Product
Android
Versions
Affected
  • From unspecified before 2018-06-05 patch level (custom)
Problem Types
TypeCWE IDDescription
CWECWE-325CWE-325
Type: CWE
CWE ID: CWE-325
Description: CWE-325
Metrics
VersionBase scoreBase severityVector
3.08.0HIGH
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Version: 3.0
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Lior Neumann and Eli Biham of the Techion Israel Institute of Technology
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.cs.technion.ac.il/~biham/BT/
x_refsource_MISC
http://www.securitytracker.com/id/1041432
vdb-entry
x_refsource_SECTRACK
https://www.kb.cert.org/vuls/id/304725
third-party-advisory
x_refsource_CERT-VN
https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
x_refsource_CONFIRM
http://www.securityfocus.com/bid/104879
vdb-entry
x_refsource_BID
https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html
mailing-list
x_refsource_MLIST
https://access.redhat.com/errata/RHSA-2019:2169
vendor-advisory
x_refsource_REDHAT
https://usn.ubuntu.com/4094-1/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/4095-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/4095-1/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/4118-1/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/4351-1/
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.cs.technion.ac.il/~biham/BT/
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id/1041432
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://www.kb.cert.org/vuls/id/304725
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/104879
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2169
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://usn.ubuntu.com/4094-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/4095-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/4095-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/4118-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/4351-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.cs.technion.ac.il/~biham/BT/
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id/1041432
vdb-entry
x_refsource_SECTRACK
x_transferred
https://www.kb.cert.org/vuls/id/304725
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/104879
vdb-entry
x_refsource_BID
x_transferred
https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html
mailing-list
x_refsource_MLIST
x_transferred
https://access.redhat.com/errata/RHSA-2019:2169
vendor-advisory
x_refsource_REDHAT
x_transferred
https://usn.ubuntu.com/4094-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/4095-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/4095-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/4118-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/4351-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.cs.technion.ac.il/~biham/BT/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id/1041432
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://www.kb.cert.org/vuls/id/304725
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/104879
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2169
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://usn.ubuntu.com/4094-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/4095-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/4095-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/4118-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/4351-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:07 Aug, 2018 | 21:29
Updated At:03 Oct, 2019 | 00:03

Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.8MEDIUM
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Secondary3.08.0HIGH
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Primary2.04.3MEDIUM
AV:A/AC:M/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.0
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.0
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:A/AC:M/Au:N/C:P/I:P/A:N
CPE Matches

Google LLC
google
>>android>>6.0
cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
Google LLC
google
>>android>>6.0.1
cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
Google LLC
google
>>android>>7.0
cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
Google LLC
google
>>android>>7.1.1
cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
Google LLC
google
>>android>>7.1.2
cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
Google LLC
google
>>android>>8.0
cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
Google LLC
google
>>android>>8.1
cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>Versions before 11.4(exclusive)
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>mac_os_x>>Versions before 10.13(exclusive)
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-347Primarynvd@nist.gov
CWE-325Secondarycret@cert.org
CWE ID: CWE-347
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-325
Type: Secondary
Source: cret@cert.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.cs.technion.ac.il/~biham/BT/cret@cert.org
Mitigation
Third Party Advisory
http://www.securityfocus.com/bid/104879cret@cert.org
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1041432cret@cert.org
Third Party Advisory
VDB Entry
https://access.redhat.com/errata/RHSA-2019:2169cret@cert.org
N/A
https://lists.debian.org/debian-lts-announce/2019/04/msg00005.htmlcret@cert.org
N/A
https://usn.ubuntu.com/4094-1/cret@cert.org
N/A
https://usn.ubuntu.com/4095-1/cret@cert.org
N/A
https://usn.ubuntu.com/4095-2/cret@cert.org
N/A
https://usn.ubuntu.com/4118-1/cret@cert.org
N/A
https://usn.ubuntu.com/4351-1/cret@cert.org
N/A
https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-updatecret@cert.org
Vendor Advisory
https://www.kb.cert.org/vuls/id/304725cret@cert.org
Third Party Advisory
US Government Resource
Hyperlink: http://www.cs.technion.ac.il/~biham/BT/
Source: cret@cert.org
Resource:
Mitigation
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/104879
Source: cret@cert.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1041432
Source: cret@cert.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://access.redhat.com/errata/RHSA-2019:2169
Source: cret@cert.org
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html
Source: cret@cert.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4094-1/
Source: cret@cert.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4095-1/
Source: cret@cert.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4095-2/
Source: cret@cert.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4118-1/
Source: cret@cert.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/4351-1/
Source: cret@cert.org
Resource: N/A
Hyperlink: https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
Source: cret@cert.org
Resource:
Vendor Advisory
Hyperlink: https://www.kb.cert.org/vuls/id/304725
Source: cret@cert.org
Resource:
Third Party Advisory
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

29Records found

CVE-2015-5824
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 27.57%
||
7 Day CHG~0.00%
Published-18 Sep, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NSURL implementation in the CFNetwork SSL component in Apple iOS before 9 does not properly verify X.509 certificates from SSL servers after a certificate change, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Action-Not Available
Vendor-n/aApple Inc.
Product-watchosiphone_osmac_os_xn/a
CVE-2013-1014
Matching Score-8
Assigner-Apple Inc.
ShareView Details
Matching Score-8
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 13.77%
||
7 Day CHG~0.00%
Published-19 May, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apple iTunes before 11.0.3 does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.

Action-Not Available
Vendor-n/aApple Inc.Microsoft Corporation
Product-windows_7ituneswindows_vistawindows_xpmac_os_xn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2024-1149
Matching Score-6
Assigner-Snow Software
ShareView Details
Matching Score-6
Assigner-Snow Software
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.32%
||
7 Day CHG~0.00%
Published-08 Feb, 2024 | 13:01
Updated-15 May, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper validation of update packages

Improper Verification of Cryptographic Signature vulnerability in Snow Software Inventory Agent on MacOS, Snow Software Inventory Agent on Windows, Snow Software Inventory Agent on Linux allows File Manipulation through Snow Update Packages.This issue affects Inventory Agent: through 6.12.0; Inventory Agent: through 6.14.5; Inventory Agent: through 6.7.2.

Action-Not Available
Vendor-snowsoftwareSnow SoftwareMicrosoft CorporationLinux Kernel Organization, IncApple Inc.
Product-snow_inventory_agentmacoswindowslinux_kernelInventory Agent
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2019-8901
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 36.57%
||
7 Day CHG~0.00%
Published-27 Oct, 2020 | 20:08
Updated-04 Aug, 2024 | 21:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed by verifying host keys when connecting to a previously-known SSH server. This issue is fixed in iOS 13.1 and iPadOS 13.1. An attacker in a privileged network position may be able to intercept SSH traffic from the “Run script over SSH” action.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osipadosiOS and iPadOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2020-26540
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.35%
||
7 Day CHG~0.00%
Published-02 Oct, 2020 | 08:00
Updated-04 Aug, 2024 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit Reader and PhantomPDF before 4.1 on macOS. Because the Hardened Runtime protection mechanism is not applied to code signing, code injection (or an information leak) can occur.

Action-Not Available
Vendor-n/aApple Inc.Foxit Software Incorporated
Product-phantompdffoxit_readermacosn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2020-24429
Matching Score-6
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-6
Assigner-Adobe Systems Incorporated
CVSS Score-7.7||HIGH
EPSS-0.12% / 31.86%
||
7 Day CHG~0.00%
Published-05 Nov, 2020 | 19:31
Updated-17 Sep, 2024 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Acrobat Reader DC for macOS Signature Verification Bypass Could Lead to Privilege Escalation

Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a signature verification bypass that could result in local privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcacrobat_readeracrobatacrobat_reader_dcwindowsmacosAcrobat Reader
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2016-11044
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.60%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 12:51
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) (with Fingerprint support) software. The check of an application's signature can be bypassed during installation. The Samsung ID is SVE-2016-5923 (June 2016).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2014-9934
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.83%
||
7 Day CHG~0.00%
Published-16 May, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A PKCS#1 v1.5 signature verification routine in all Android releases from CAF using the Linux kernel may not check padding.

Action-Not Available
Vendor-Google LLCQualcomm Technologies, Inc.
Product-androidAll Qualcomm Products
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2019-20597
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 20.37%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 19:07
Updated-05 Aug, 2024 | 02:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with N(7.1), O(8.x), and P(9.0) software. SPENgesture allows arbitrary applications to read or modify user-input logs. The Samsung ID is SVE-2019-14170 (June 2019).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-43185
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 23:35
Updated-31 Jul, 2025 | 20:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.6. An app may be able to access protected user data.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-22573
Matching Score-6
Assigner-Google LLC
ShareView Details
Matching Score-6
Assigner-Google LLC
CVSS Score-8.7||HIGH
EPSS-0.05% / 16.14%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 15:45
Updated-21 Apr, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect signature verification on Google-oauth-java-client

The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above

Action-Not Available
Vendor-Google LLC
Product-oauth_client_library_for_javaGoogle-oauth-java-client
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2023-43611
Matching Score-6
Assigner-F5, Inc.
ShareView Details
Matching Score-6
Assigner-F5, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.13%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 12:34
Updated-19 Sep, 2024 | 13:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIG-IP Edge Client for macOS vulnerability

The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process.  This vulnerability is due to an incomplete fix for CVE-2023-38418.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Action-Not Available
Vendor-Apple Inc.F5, Inc.
Product-big-ip_webacceleratorbig-ip_ssl_orchestratorbig-ip_application_acceleration_managerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_local_traffic_managerbig-ip_analyticsmacosbig-ip_domain_name_systembig-ip_application_security_managerbig-ip_edge_gatewaybig-ip_advanced_web_application_firewallbig-ip_carrier-grade_natbig-ip_link_controllerbig-ip_application_visibility_and_reportingbig-ip_access_policy_managerbig-ip_websafebig-ip_advanced_firewall_managerbig-ip_ddos_hybrid_defenderBIG-IP Edge Clientbig-ip_edge_client
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-22946
Matching Score-6
Assigner-HackerOne
ShareView Details
Matching Score-6
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.66%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 00:00
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxOracle CorporationSiemens AGSplunk LLC (Cisco Systems, Inc.)Apple Inc.CURLFedora Project
Product-peoplesoft_enterprise_peopletoolscommunications_cloud_native_core_consolecommunications_cloud_native_core_network_function_cloud_native_environmentcloud_backuph300s_firmwareh410smacoscurlh300ssolidfire_baseboard_management_controllersnapcenterh300e_firmwaresinec_infrastructure_network_servicesclustered_data_ontaph500efedorah500s_firmwareh500e_firmwarecommunications_cloud_native_core_binding_support_functionh700eoncommand_insighth300ecommunications_cloud_native_core_service_communication_proxycommunications_cloud_native_core_network_slice_selection_functioncommunications_cloud_native_core_security_edge_protection_proxyh500scommunications_cloud_native_core_network_repository_functiononcommand_workflow_automationuniversal_forwarderdebian_linuxh410s_firmwareh700s_firmwareh700e_firmwaresolidfire_baseboard_management_controller_firmwareh700scommerce_guided_searchmysql_serverhttps://github.com/curl/curl
CWE ID-CWE-325
Missing Cryptographic Step
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-41744
Matching Score-6
Assigner-Acronis International GmbH
ShareView Details
Matching Score-6
Assigner-Acronis International GmbH
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.20%
||
7 Day CHG~0.00%
Published-31 Aug, 2023 | 15:14
Updated-01 Oct, 2024 | 17:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.

Action-Not Available
Vendor-Apple Inc.Acronis (Acronis International GmbH)
Product-cyber_protectmacosagentAcronis AgentAcronis Cyber Protect 15cyber_protectagent
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2023-44077
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 28.99%
||
7 Day CHG~0.00%
Published-17 Jan, 2024 | 00:00
Updated-17 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Studio Network Solutions ShareBrowser before 7.0 on macOS mishandles signature verification, aka PMP-2636.

Action-Not Available
Vendor-studionetworksolutionsn/aApple Inc.
Product-macossharebrowsern/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2020-24439
Matching Score-6
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-6
Assigner-Adobe Systems Incorporated
CVSS Score-2.8||LOW
EPSS-0.04% / 12.06%
||
7 Day CHG~0.00%
Published-05 Nov, 2020 | 19:32
Updated-17 Sep, 2024 | 00:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Acrobat Reader DC for macOS Signature Validation Bypass

Acrobat Reader DC for macOS versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a security feature bypass. While the practical security impact is minimal, a defense-in-depth fix has been implemented to further harden the Adobe Reader update process.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcacrobat_readeracrobatacrobat_reader_dcwindowsmacosAcrobat Reader
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-4111
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.46% / 63.31%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 06:00
Updated-05 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. macOS before 10.13.4 is affected. The issue involves the "Mail" component. It allows man-in-the-middle attackers to read S/MIME encrypted message content by sending HTML e-mail that references remote resources but lacks a valid S/MIME signature.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2022-42793
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.81%
||
7 Day CHG~0.00%
Published-01 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in code signature validation was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, macOS Monterey 12.6. An app may be able to bypass code signing checks.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osmacosmacOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-16042
Matching Score-6
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-6
Assigner-Adobe Systems Incorporated
CVSS Score-6.5||MEDIUM
EPSS-23.00% / 95.70%
||
7 Day CHG~0.00%
Published-18 Jan, 2019 | 17:00
Updated-05 Aug, 2024 | 10:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a security bypass vulnerability. Successful exploitation could lead to information disclosure.

Action-Not Available
Vendor-iskysoftn/aLinux Kernel Organization, IncAdobe Inc.Apple Inc.Microsoft Corporation
Product-acrobat_dcreaderlinux_kernelacrobat_reader_dcmac_os_xpdfelement6windowspdf_editor_6n/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-10470
Matching Score-6
Assigner-Objective Development Software GmbH
ShareView Details
Matching Score-6
Assigner-Objective Development Software GmbH
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 30.09%
||
7 Day CHG~0.00%
Published-12 Jun, 2018 | 17:00
Updated-16 Sep, 2024 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.

Action-Not Available
Vendor-objective_developmentObjective Development Software GmbHApple Inc.
Product-macoslittle_snitchLittle Snitch
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2017-5066
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.57%
||
7 Day CHG~0.00%
Published-27 Oct, 2017 | 05:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.Apple Inc.Microsoft CorporationGoogle LLC
Product-chromeenterprise_linux_desktopenterprise_linux_workstationlinux_kernelwindowsenterprise_linux_servermacosandroidGoogle Chrome prior to 58.0.3029.81 for Mac, Windows and Linux, and 58.0.3029.83 for Android
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2023-20940
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-6
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.56%
||
7 Day CHG~0.00%
Published-28 Feb, 2023 | 00:00
Updated-21 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Android operating system, there is a possible way to replace a boot partition due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-256237041

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2022-24115
Matching Score-6
Assigner-Acronis International GmbH
ShareView Details
Matching Score-6
Assigner-Acronis International GmbH
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:29
Updated-16 Sep, 2024 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation due to unrestricted loading of unsigned libraries

Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287

Action-Not Available
Vendor-Apple Inc.Acronis (Acronis International GmbH)
Product-true_imagecyber_protect_home_officemacosAcronis Cyber Protect Home OfficeAcronis True Image 2021
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-18689
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.33%
||
7 Day CHG~0.00%
Published-07 Jan, 2021 | 17:59
Updated-27 Nov, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Architect 6, PDF Editor 6 Pro, PDF Experte 9 Ultimate, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, PDF-XChange Editor and Viewer, Perfect PDF 10 Premium, Perfect PDF Reader, Soda PDF, and Soda PDF Desktop.

Action-Not Available
Vendor-qoppasodapdfpdfforgeiskysoftgonitrosoft-xpansionavanquestvisagesoftn/aLinux Kernel Organization, IncMicrosoft CorporationFoxit Software IncorporatedPDF-XChange Co Ltd.Apple Inc.
Product-foxit_readerpdf_studiopdf_experte_ultimatesoda_pdf_desktoppdf-xchange_editorpdfelement6nitro_pronitro_readermacosexpert_pdf_ultimatesoda_pdfperfect_pdf_readerlinux_kernelwindowspdf_studio_viewer_2018pdf_architectpdf_editor_6perfect_pdf_10expert_pdf_readerpdf-xchange_viewern/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2018-18688
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.33%
||
7 Day CHG~0.00%
Published-07 Jan, 2021 | 17:38
Updated-05 Aug, 2024 | 11:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the Incremental Saving feature to add pages or annotations, Body Updates are displayed to the user without any action by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects LibreOffice, Master PDF Editor, Nitro Pro, Nitro Reader, Nuance Power PDF Standard, PDF Editor 6 Pro, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, Perfect PDF 10 Premium, and Perfect PDF Reader.

Action-Not Available
Vendor-qoppacode-industrynuanceiskysoftgonitrosoft-xpansionlibreofficen/aLinux Kernel Organization, IncMicrosoft CorporationApple Inc.Foxit Software Incorporated
Product-pdf_studiophantompdfpdfelement6nitro_pronitro_readermacosperfect_pdf_readerlinux_kernelwindowsmaster_pdf_editorpower_pdf_standardpdf_studio_viewer_2018libreofficepdf_editor_6perfect_pdf_10foxit_readern/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2011-3965
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-5||MEDIUM
EPSS-0.25% / 47.95%
||
7 Day CHG~0.00%
Published-09 Feb, 2012 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2017-2423
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.29% / 52.12%
||
7 Day CHG~0.00%
Published-02 Apr, 2017 | 01:36
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. The issue involves the "Security" component. It allows remote attackers to bypass intended access restrictions by leveraging a successful result from a SecKeyRawVerify API call with an empty signature.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osmac_os_xn/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-32911
Matching Score-6
Assigner-Google Devices
ShareView Details
Matching Score-6
Assigner-Google Devices
CVSS Score-7.5||HIGH
EPSS-1.90% / 82.48%
||
7 Day CHG-1.95%
Published-13 Jun, 2024 | 21:02
Updated-06 Sep, 2024 | 23:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a possible escalation of privilege due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid_kernel
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2021-1849
Matching Score-6
Assigner-Apple Inc.
ShareView Details
Matching Score-6
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.76%
||
7 Day CHG~0.00%
Published-08 Sep, 2021 | 14:44
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in code signature validation was addressed with improved checks. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. A malicious application may be able to bypass Privacy preferences.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_oswatchostvosipadosmacostvOSmacOSwatchOSiOS and iPadOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
Details not found