Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-71063

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-12 Jan, 2026 | 15:56
Updated At-12 Jan, 2026 | 16:26
Rejected At-
Credits

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:12 Jan, 2026 | 15:56
Updated At:12 Jan, 2026 | 16:26
Rejected At:
â–¼CVE Numbering Authority (CNA)

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.

Affected Products
Vendor
mrvladus
Product
Errands
Default Status
unaffected
Versions
Affected
  • From 0 before 46.2.10 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-295CWE-295 Improper Certificate Validation
Type: CWE
CWE ID: CWE-295
Description: CWE-295 Improper Certificate Validation
Metrics
VersionBase scoreBase severityVector
3.18.2HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/mrvladus/Errands/issues/401
N/A
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123738
N/A
https://github.com/mrvladus/Errands/releases/tag/46.2.10
N/A
https://github.com/mrvladus/Errands/commit/04e567b432083fc798ea2249363ea6c83ff01099
N/A
https://github.com/mrvladus/Errands/compare/46.2.9...46.2.10
N/A
Hyperlink: https://github.com/mrvladus/Errands/issues/401
Resource: N/A
Hyperlink: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123738
Resource: N/A
Hyperlink: https://github.com/mrvladus/Errands/releases/tag/46.2.10
Resource: N/A
Hyperlink: https://github.com/mrvladus/Errands/commit/04e567b432083fc798ea2249363ea6c83ff01099
Resource: N/A
Hyperlink: https://github.com/mrvladus/Errands/compare/46.2.9...46.2.10
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:12 Jan, 2026 | 16:16
Updated At:05 Feb, 2026 | 19:46

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.2HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Primary3.17.5HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

mrvladus
mrvladus
>>errands>>Versions before 46.2.10(exclusive)
cpe:2.3:a:mrvladus:errands:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-295Primarycve@mitre.org
CWE ID: CWE-295
Type: Primary
Source: cve@mitre.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123738cve@mitre.org
Third Party Advisory
Mailing List
https://github.com/mrvladus/Errands/commit/04e567b432083fc798ea2249363ea6c83ff01099cve@mitre.org
Patch
https://github.com/mrvladus/Errands/compare/46.2.9...46.2.10cve@mitre.org
Patch
https://github.com/mrvladus/Errands/issues/401cve@mitre.org
Issue Tracking
https://github.com/mrvladus/Errands/releases/tag/46.2.10cve@mitre.org
Release Notes
Hyperlink: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123738
Source: cve@mitre.org
Resource:
Third Party Advisory
Mailing List
Hyperlink: https://github.com/mrvladus/Errands/commit/04e567b432083fc798ea2249363ea6c83ff01099
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/mrvladus/Errands/compare/46.2.9...46.2.10
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/mrvladus/Errands/issues/401
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/mrvladus/Errands/releases/tag/46.2.10
Source: cve@mitre.org
Resource:
Release Notes

Change History

0
Information is not available yet

Similar CVEs

9Records found

CVE-2024-48865
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-7.3||HIGH
EPSS-0.07% / 20.21%
||
7 Day CHG~0.00%
Published-06 Dec, 2024 | 16:36
Updated-23 Sep, 2025 | 14:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QTS, QuTS hero

An improper certificate validation vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow attackers with local network access to compromise the security of the system. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-quts_heroqtsQuTS heroQTSquts_heroqts
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-27323
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.5||HIGH
EPSS-1.62% / 81.50%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 21:48
Updated-03 Dec, 2024 | 22:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PDF-XChange Editor Updater Improper Certificate Validation Remote Code Execution Vulnerability

PDF-XChange Editor Updater Improper Certificate Validation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is not required to exploit this vulnerability. The specific flaw exists within the update functionality. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22224.

Action-Not Available
Vendor-PDF-XChange Co Ltd.
Product-pdf-toolspdf-xchange_editorPDF-XChange Editorpdf-xchange_editor
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-51634
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.5||HIGH
EPSS-0.61% / 69.30%
||
7 Day CHG~0.00%
Published-22 Nov, 2024 | 20:04
Updated-03 Jan, 2025 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NETGEAR RAX30 Improper Certificate Validation Remote Code Execution Vulnerability

NETGEAR RAX30 Improper Certificate Validation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-19589.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-rax30_firmwarerax30RAX30rax30_firmware
CWE ID-CWE-295
Improper Certificate Validation
CVE-2023-4801
Matching Score-4
Assigner-Proofpoint Inc.
ShareView Details
Matching Score-4
Assigner-Proofpoint Inc.
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.50%
||
7 Day CHG~0.00%
Published-13 Sep, 2023 | 15:14
Updated-25 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ITM MacOS Agent Improper Certificate Validation

An improper certification validation vulnerability in the Insider Threat Management (ITM) Agent for MacOS could be used by an anonymous actor on an adjacent network to establish a man-in-the-middle position between the agent and the ITM server after the agent has registered. All versions prior to 7.14.3.69 are affected. Agents for Windows, Linux, and Cloud are unaffected.

Action-Not Available
Vendor-proofpointProofpointproofpoint
Product-insider_threat_managementInsider Threat Managementinsider_threat_management
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-12943
Matching Score-4
Assigner-a2826606-91e7-4eb6-899e-8484bd4575d5
ShareView Details
Matching Score-4
Assigner-a2826606-91e7-4eb6-899e-8484bd4575d5
CVSS Score-5.2||MEDIUM
EPSS-0.02% / 3.77%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 16:17
Updated-07 Jan, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper certificate validation in firmware update logic in NETGEAR RAX30 and RAXE300

Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router) allows attackers with the ability to intercept and tamper traffic destined to the device to execute arbitrary commands on the device. Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update to the latest. Fixed in: RAX30 firmware 1.0.14.108 or later. RAXE300 firmware 1.0.9.82 or later

Action-Not Available
Vendor-NETGEAR, Inc.
Product-rax30_firmwarerax30raxe300_firmwareraxe300RAXE300RAX30
CWE ID-CWE-295
Improper Certificate Validation
CVE-2021-41028
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-8.2||HIGH
EPSS-0.14% / 33.53%
||
7 Day CHG~0.00%
Published-16 Dec, 2021 | 18:13
Updated-25 Oct, 2024 | 13:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientforticlient_endpoint_management_serverFortinet FortiClientEMS, FortiClientWindows, FortiClientLinux, FortiClientMac
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-32330
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.31%
||
7 Day CHG~0.00%
Published-07 Feb, 2024 | 16:09
Updated-03 Nov, 2025 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Access man in the middle

IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure calls that could allow an attacker on the network to take control of the server. IBM X-Force ID: 254977.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_accessSecurity Verify Access ApplianceSecurity Verify Access Docker
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-10495
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.7||HIGH
EPSS-0.02% / 5.59%
||
7 Day CHG~0.00%
Published-12 Nov, 2025 | 19:18
Updated-14 Nov, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability was reported in the Lenovo PC Manager, Lenovo App Store, Lenovo Browser, and Lenovo Legion Zone client applications that, under certain conditions, could allow an attacker on the same logical network to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Legion ZonePC ManagerApp StoreBrowser
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-8287
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.91%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 18:35
Updated-24 Sep, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this.

Action-Not Available
Vendor-Canonical Ltd.
Product-anbox_cloudAnbox Cloudanbox_cloud
CWE ID-CWE-295
Improper Certificate Validation
Details not found