Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-31486

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-28 Apr, 2023 | 00:00
Updated At-30 Jan, 2025 | 19:26
Rejected At-
Credits

HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
ā–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:28 Apr, 2023 | 00:00
Updated At:30 Jan, 2025 | 19:26
Rejected At:
ā–¼CVE Numbering Authority (CNA)

HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
N/A
https://www.openwall.com/lists/oss-security/2023/04/18/14
N/A
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
N/A
https://hackeriet.github.io/cpan-http-tiny-overview/
N/A
http://www.openwall.com/lists/oss-security/2023/04/29/1
mailing-list
http://www.openwall.com/lists/oss-security/2023/05/03/3
mailing-list
http://www.openwall.com/lists/oss-security/2023/05/03/5
mailing-list
https://www.openwall.com/lists/oss-security/2023/05/03/4
N/A
http://www.openwall.com/lists/oss-security/2023/05/07/2
mailing-list
https://github.com/chansen/p5-http-tiny/pull/153
N/A
Hyperlink: https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2023/04/18/14
Resource: N/A
Hyperlink: https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
Resource: N/A
Hyperlink: https://hackeriet.github.io/cpan-http-tiny-overview/
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/04/29/1
Resource:
mailing-list
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/3
Resource:
mailing-list
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/5
Resource:
mailing-list
Hyperlink: https://www.openwall.com/lists/oss-security/2023/05/03/4
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/07/2
Resource:
mailing-list
Hyperlink: https://github.com/chansen/p5-http-tiny/pull/153
Resource: N/A
ā–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
x_transferred
https://www.openwall.com/lists/oss-security/2023/04/18/14
x_transferred
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
x_transferred
https://hackeriet.github.io/cpan-http-tiny-overview/
x_transferred
http://www.openwall.com/lists/oss-security/2023/04/29/1
mailing-list
x_transferred
http://www.openwall.com/lists/oss-security/2023/05/03/3
mailing-list
x_transferred
http://www.openwall.com/lists/oss-security/2023/05/03/5
mailing-list
x_transferred
https://www.openwall.com/lists/oss-security/2023/05/03/4
x_transferred
http://www.openwall.com/lists/oss-security/2023/05/07/2
mailing-list
x_transferred
https://github.com/chansen/p5-http-tiny/pull/153
x_transferred
https://security.netapp.com/advisory/ntap-20241129-0011/
N/A
Hyperlink: https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
Resource:
x_transferred
Hyperlink: https://www.openwall.com/lists/oss-security/2023/04/18/14
Resource:
x_transferred
Hyperlink: https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
Resource:
x_transferred
Hyperlink: https://hackeriet.github.io/cpan-http-tiny-overview/
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/04/29/1
Resource:
mailing-list
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/3
Resource:
mailing-list
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/5
Resource:
mailing-list
x_transferred
Hyperlink: https://www.openwall.com/lists/oss-security/2023/05/03/4
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/07/2
Resource:
mailing-list
x_transferred
Hyperlink: https://github.com/chansen/p5-http-tiny/pull/153
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20241129-0011/
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-295CWE-295 Improper Certificate Validation
Type: CWE
CWE ID: CWE-295
Description: CWE-295 Improper Certificate Validation
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
ā–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:29 Apr, 2023 | 00:15
Updated At:30 Jan, 2025 | 20:15

HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

http\
http\
>>\>>tiny_project
cpe:2.3:a:http\:\:tiny_project:http\:\:tiny:*:*:*:*:*:*:*:*
perl
perl
>>perl>>Versions before 5.38.0(exclusive)
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarynvd@nist.gov
CWE-295Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-295
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-295
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2023/04/29/1cve@mitre.org
Mailing List
Patch
http://www.openwall.com/lists/oss-security/2023/05/03/3cve@mitre.org
Mailing List
Patch
http://www.openwall.com/lists/oss-security/2023/05/03/5cve@mitre.org
Mailing List
http://www.openwall.com/lists/oss-security/2023/05/07/2cve@mitre.org
Mailing List
Third Party Advisory
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/cve@mitre.org
Mitigation
Patch
Third Party Advisory
https://github.com/chansen/p5-http-tiny/pull/153cve@mitre.org
Patch
https://hackeriet.github.io/cpan-http-tiny-overview/cve@mitre.org
Product
https://www.openwall.com/lists/oss-security/2023/04/18/14cve@mitre.org
Mailing List
Patch
https://www.openwall.com/lists/oss-security/2023/05/03/4cve@mitre.org
Mailing List
Third Party Advisory
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/cve@mitre.org
Issue Tracking
http://www.openwall.com/lists/oss-security/2023/04/29/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
http://www.openwall.com/lists/oss-security/2023/05/03/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
http://www.openwall.com/lists/oss-security/2023/05/03/5af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/05/07/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/af854a3a-2127-422b-91ae-364da2661108
Mitigation
Patch
Third Party Advisory
https://github.com/chansen/p5-http-tiny/pull/153af854a3a-2127-422b-91ae-364da2661108
Patch
https://hackeriet.github.io/cpan-http-tiny-overview/af854a3a-2127-422b-91ae-364da2661108
Product
https://security.netapp.com/advisory/ntap-20241129-0011/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.openwall.com/lists/oss-security/2023/04/18/14af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://www.openwall.com/lists/oss-security/2023/05/03/4af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Hyperlink: http://www.openwall.com/lists/oss-security/2023/04/29/1
Source: cve@mitre.org
Resource:
Mailing List
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/3
Source: cve@mitre.org
Resource:
Mailing List
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/5
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/07/2
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
Source: cve@mitre.org
Resource:
Mitigation
Patch
Third Party Advisory
Hyperlink: https://github.com/chansen/p5-http-tiny/pull/153
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://hackeriet.github.io/cpan-http-tiny-overview/
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://www.openwall.com/lists/oss-security/2023/04/18/14
Source: cve@mitre.org
Resource:
Mailing List
Patch
Hyperlink: https://www.openwall.com/lists/oss-security/2023/05/03/4
Source: cve@mitre.org
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: http://www.openwall.com/lists/oss-security/2023/04/29/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/03/5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/05/07/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mitigation
Patch
Third Party Advisory
Hyperlink: https://github.com/chansen/p5-http-tiny/pull/153
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://hackeriet.github.io/cpan-http-tiny-overview/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: https://security.netapp.com/advisory/ntap-20241129-0011/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2023/04/18/14
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://www.openwall.com/lists/oss-security/2023/05/03/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking

Change History

0
Information is not available yet

Similar CVEs

74Records found

CVE-2022-4895
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-0.21% / 43.09%
||
7 Day CHG~0.00%
Published-28 Feb, 2023 | 02:03
Updated-07 Mar, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Man-in-the-middle attack Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer

Improper Certificate Validation vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component) allows Man in the Middle Attack.This issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.1-00.

Action-Not Available
Vendor-Linux Kernel Organization, IncHitachi, Ltd.
Product-infrastructure_analytics_advisorlinux_kernelops_center_analyzerHitachi Ops Center AnalyzerHitachi Infrastructure Analytics Advisor
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-67752
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.1||HIGH
EPSS-0.01% / 0.95%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 01:09
Updated-27 Feb, 2026 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenEMR Has Disabled SSL Certificate Verification in HTTP Client

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, OpenEMR's HTTP client wrapper (`oeHttp`/`oeHttpRequest`) disables SSL/TLS certificate verification by default (`verify: false`), making all external HTTPS connections vulnerable to man-in-the-middle (MITM) attacks. This affects communication with government healthcare APIs and user-configurable external services, potentially exposing Protected Health Information (PHI). Version 7.0.4 fixes the issue.

Action-Not Available
Vendor-OpenEMR Foundation, Inc
Product-openemropenemr
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-21959
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.7||HIGH
EPSS-0.31% / 53.89%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:29
Updated-15 Apr, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A misconfiguration exists in the MQTTS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. This misconfiguration significantly simplifies a man-in-the-middle attack, which directly leads to control of device functionality.

Action-Not Available
Vendor-sealeveln/a
Product-seaconnect_370w_firmwareseaconnect_370wSealevel
CWE ID-CWE-295
Improper Certificate Validation
CVE-2020-5367
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.4||HIGH
EPSS-0.23% / 45.25%
||
7 Day CHG~0.00%
Published-23 Jun, 2020 | 20:00
Updated-16 Sep, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an improper certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim's data in transit.

Action-Not Available
Vendor-Dell Inc.
Product-emc_unisphere_for_powermaxpowermax_osemc_unisphere_for_powermax_virtual_applianceUnisphere for PowerMax, Unisphere for PowerMax Virtual Appliance, PowerMax OS
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-31489
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.24% / 47.83%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 14:37
Updated-20 Sep, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortiClientLinuxFortiClientMacFortiClientEMSFortiClientWindowsforticlientwindowsforticlientlinuxforticlientmac
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-28872
Matching Score-4
Assigner-Internet Systems Consortium (ISC)
ShareView Details
Matching Score-4
Assigner-Internet Systems Consortium (ISC)
CVSS Score-8.9||HIGH
EPSS-0.25% / 47.88%
||
7 Day CHG~0.00%
Published-11 Jul, 2024 | 14:49
Updated-26 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect TLS certificate validation can lead to escalated privileges

The TLS certificate validation code is flawed. An attacker can obtain a TLS certificate from the Stork server and use it to connect to the Stork agent. Once this connection is established with the valid certificate, the attacker can send malicious commands to a monitored service (Kea or BIND 9), possibly resulting in confidential data loss and/or denial of service. It should be noted that this vulnerability is not related to BIND 9 or Kea directly, and only customers using the Stork management tool are potentially affected. This issue affects Stork versions 0.15.0 through 1.15.0.

Action-Not Available
Vendor-Internet Systems Consortium, Inc.
Product-storkStork
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-1000256
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.90% / 75.93%
||
7 Day CHG~0.00%
Published-31 Oct, 2017 | 15:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxlibvirtn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2016-9952
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.58% / 69.02%
||
7 Day CHG~0.00%
Published-12 Mar, 2018 | 21:00
Updated-07 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."

Action-Not Available
Vendor-n/aMicrosoft CorporationCURL
Product-curlwindows_embedded_compactn/acurl
CWE ID-CWE-295
Improper Certificate Validation
CVE-2015-8960
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.33% / 55.73%
||
7 Day CHG~0.00%
Published-21 Sep, 2016 | 01:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a client secret key and server public key but not a server secret key, which makes it easier for man-in-the-middle attackers to spoof TLS servers by leveraging knowledge of the secret key for an arbitrary installed client X.509 certificate, aka the "Key Compromise Impersonation (KCI)" issue.

Action-Not Available
Vendor-n/aApple Inc.The IETF Administration LLC (IETF LLC)Google LLCOperaMozilla CorporationMicrosoft CorporationNetApp, Inc.
Product-snapdriveopera_browserdata_ontap_edgesolidfire_\&_hci_management_nodetransport_layer_securityplug-in_for_symantec_netbackupchromesnapprotectclustered_data_ontap_antivirus_connectorinternet_explorerfirefoxsnap_creator_frameworksnapmanageroncommand_shifthost_agentsafarisystem_setupsmi-s_providern/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-40801
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.2||CRITICAL
EPSS-0.02% / 6.13%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 10:44
Updated-10 Mar, 2026 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in COMOS V10.6 (All versions < V10.6.1), COMOS V10.6 (All versions < V10.6.1), JT Bi-Directional Translator for STEP (All versions), NX V2412 (All versions < V2412.8900 with Cloud Entitlement (bundled as NX X)), NX V2506 (All versions < V2506.6000 with Cloud Entitlement (bundled as NX X)), Simcenter 3D (All versions < V2506.6000 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Femap (All versions < V2506.0002 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Studio (All versions < V2506.0001), Simcenter System Architect (All versions < V2506.0001), Tecnomatix Plant Simulation (All versions < V2504.0007). The SALT SDK is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

Action-Not Available
Vendor-Siemens AG
Product-JT Bi-Directional Translator for STEPNX V2412NX V2506Simcenter 3DSimcenter StudioTecnomatix Plant SimulationCOMOS V10.6Simcenter System ArchitectSimcenter Femap
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-6680
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-7.4||HIGH
EPSS-0.03% / 8.54%
||
7 Day CHG-0.00%
Published-15 Dec, 2023 | 16:02
Updated-12 May, 2026 | 04:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Certificate Validation in GitLab

An improper certificate validation issue in Smartcard authentication in GitLab EE affecting all versions from 11.6 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows an attacker to authenticate as another user given their public key if they use Smartcard authentication. Smartcard authentication is an experimental feature and has to be manually enabled by an administrator.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-48427
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.1||HIGH
EPSS-0.08% / 23.19%
||
7 Day CHG~0.00%
Published-12 Dec, 2023 | 11:27
Updated-25 Nov, 2024 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected products do not properly validate the certificate of the configured UMC server. This could allow an attacker to intercept credentials that are sent to the UMC server as well as to manipulate responses, potentially allowing an attacker to escalate privileges.

Action-Not Available
Vendor-Siemens AG
Product-sinec_insSINEC INS
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-38351
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-5.97% / 90.76%
||
7 Day CHG~0.00%
Published-19 Sep, 2023 | 00:00
Updated-25 Sep, 2024 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MiniTool Partition Wizard 12.8 contains an insecure installation mechanism that allows attackers to achieve remote code execution through a man in the middle attack.

Action-Not Available
Vendor-minitooln/a
Product-partition_wizardn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-38356
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-5.97% / 90.76%
||
7 Day CHG~0.00%
Published-19 Sep, 2023 | 00:00
Updated-25 Sep, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MiniTool Power Data Recovery 11.6 contains an insecure installation process that allows attackers to achieve remote code execution through a man in the middle attack.

Action-Not Available
Vendor-minitooln/a
Product-power_data_recoveryn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-38352
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-5.97% / 90.76%
||
7 Day CHG~0.00%
Published-19 Sep, 2023 | 00:00
Updated-25 Sep, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MiniTool Partition Wizard 12.8 contains an insecure update mechanism that allows attackers to achieve remote code execution through a man in the middle attack.

Action-Not Available
Vendor-minitooln/a
Product-partition_wizardn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-38354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-5.97% / 90.76%
||
7 Day CHG~0.00%
Published-19 Sep, 2023 | 00:00
Updated-25 Sep, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MiniTool Shadow Maker version 4.1 contains an insecure installation process that allows attackers to achieve remote code execution through a man in the middle attack.

Action-Not Available
Vendor-minitooln/a
Product-shadowmakern/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-3615
Matching Score-4
Assigner-Mattermost, Inc.
ShareView Details
Matching Score-4
Assigner-Mattermost, Inc.
CVSS Score-8.1||HIGH
EPSS-0.29% / 52.30%
||
7 Day CHG+0.02%
Published-17 Jul, 2023 | 15:33
Updated-30 Oct, 2024 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of server certificate validation in websockets connection

Mattermost iOS app failsĀ to properlyĀ validate the server certificate while initializing the TLS connection allowing a network attacker to intercept the WebSockets connection.

Action-Not Available
Vendor-Mattermost, Inc.
Product-mattermostMattermost iOS app
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-34143
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.09% / 25.40%
||
7 Day CHG+0.01%
Published-18 Jul, 2023 | 02:03
Updated-21 Oct, 2024 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Certificate Vulnerability in Hitachi Device Manager

Improper Validation of Certificate with Host Mismatch vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Server, Device Manager Agent, Host Data Collector components) allows Man in the Middle Attack.This issue affects Hitachi Device Manager: before 8.8.5-02.

Action-Not Available
Vendor-Linux Kernel Organization, IncHitachi, Ltd.Microsoft Corporation
Product-windowsdevice_managerlinux_kernelHitachi Device Manager
CWE ID-CWE-297
Improper Validation of Certificate with Host Mismatch
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-35142
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-8.1||HIGH
EPSS-0.10% / 26.81%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 12:53
Updated-02 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Checkmarx Plugin 2022.4.3 and earlier disables SSL/TLS validation for connections to the Checkmarx server by default.

Action-Not Available
Vendor-Jenkins
Product-checkmarxJenkins Checkmarx Plugin
CWE ID-CWE-295
Improper Certificate Validation
CVE-2018-1000500
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.56% / 68.45%
||
7 Day CHG~0.00%
Published-26 Jun, 2018 | 16:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

Action-Not Available
Vendor-busyboxn/a
Product-busyboxn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-30729
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.1||HIGH
EPSS-0.27% / 50.59%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 03:12
Updated-26 Sep, 2024 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Certificate Validation in Samsung Email prior to version 6.1.82.0 allows remote attacker to intercept the network traffic including sensitive information.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-emailSamsung Email
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-31190
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-8.1||HIGH
EPSS-0.11% / 29.36%
||
7 Day CHG~0.00%
Published-11 Jul, 2023 | 08:43
Updated-12 Nov, 2024 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing TLS (HTTPS) certificate validation during firmware update in DroneScout ds230 Remote ID receiver from BlueMark Innovations

DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by anĀ Improper Authentication vulnerability during the firmware update procedure. Specifically, the firmware update procedure ignores and does not check the validity of the TLS certificate of the HTTPS endpoint from which the firmware update package (.tar.bz2 file) is downloaded. An attacker with the ability to put himself in a Man-in-the-Middle situation (e.g., DNS poisoning, ARP poisoning, control of a node on the route to the endpoint, etc.) can trick the DroneScout ds230 to install a crafted malicious firmware update containing arbitrary files (e.g., executable and configuration) and gain administrative (root) privileges on the underlying Linux operating system. This issue affects DroneScout ds230 firmware from version 20211210-1627 through 20230329-1042.

Action-Not Available
Vendor-bluemarkbluemarkbluemark
Product-dronescout_ds230dronescout_ds230_firmwareds230dronescout_ds230
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-287
Improper Authentication
CVE-2023-23546
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-4.2||MEDIUM
EPSS-0.14% / 32.94%
||
7 Day CHG~0.00%
Published-06 Jul, 2023 | 14:53
Updated-02 Aug, 2024 | 10:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A misconfiguration vulnerability exists in the urvpn_client functionality of Milesight UR32L v32.3.0.5. A specially-crafted man-in-the-middle attack can lead to increased privileges. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.

Action-Not Available
Vendor-Milesight
Product-ur32l_firmwareur32lUR32L
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-22642
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.20% / 42.41%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 16:07
Updated-23 Oct, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4.8 through 6.4.10 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and the remote FortiGuard server hosting outbreakalert ressources.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortianalyzerfortimanagerFortiManagerFortiAnalyzer
CWE ID-CWE-295
Improper Certificate Validation
  • Previous
  • 1
  • 2
  • Next
Details not found