Vulnerabilities (CVE)

Filtered by CWE-295
Total 976 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-2033 1 Paloaltonetworks 1 Globalprotect 2020-06-16 2.9 LOW 5.3 MEDIUM
When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the 'pre-login' user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled.
CVE-2020-0119 1 Google 1 Android 2020-06-15 5.4 MEDIUM 5.3 MEDIUM
In addOrUpdateNetworkInternal and related functions of WifiConfigManager.java, there is a possible man in the middle attack due to improper certificate validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150500247
CVE-2020-9040 1 Couchbase 1 Couchbase Server Java Sdk 2020-06-11 5.0 MEDIUM 7.5 HIGH
Couchbase Server Java SDK before 2.7.1.1 allows a potential attacker to forge an SSL certificate and pose as the intended peer. An attacker can leverage this flaw by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification.
CVE-2020-10059 1 Zephyrproject 1 Zephyr 2020-06-05 5.8 MEDIUM 4.8 MEDIUM
The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
CVE-2020-13616 1 Pichi Project 1 Pichi 2020-05-29 4.3 MEDIUM 5.9 MEDIUM
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
CVE-2020-13245 1 Netgear 28 R6120, R6120 Firmware, R6220 and 25 more 2020-05-29 4.3 MEDIUM 5.9 MEDIUM
Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.
CVE-2020-13615 1 Qore 1 Qore 2020-05-28 4.3 MEDIUM 5.9 MEDIUM
lib/QoreSocket.cpp in Qore before 0.9.4.2 lacks hostname verification for X.509 certificates.
CVE-2010-4685 1 Cisco 1 Ios 2020-05-19 4.0 MEDIUM N/A
Cisco IOS before 15.0(1)XA1 does not clear the public key cache upon a change to a certificate map, which allows remote authenticated users to bypass a certificate ban by connecting with a banned certificate that had previously been valid, aka Bug ID CSCta79031.
CVE-2020-12637 1 Zulipchat 1 Zulip Desktop 2020-05-13 7.5 HIGH 9.8 CRITICAL
Zulip Desktop before 5.2.0 has Missing SSL Certificate Validation because all validation was inadvertently disabled during an attempt to recognize the ignoreCerts option.
CVE-2020-1952 1 Apache 1 Iotdb 2020-05-04 7.5 HIGH 9.8 CRITICAL
An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely.
CVE-2020-11806 1 Mailstore 1 Mailstore Server 2020-05-01 4.3 MEDIUM 5.9 MEDIUM
In MailStore Outlook Add-in (and Email Archive Outlook Add-in) through 12.1.2, the login process does not validate the validity of the certificate presented by the server.
CVE-2020-5864 1 F5 1 Nginx Controller 2020-04-30 5.8 MEDIUM 7.4 HIGH
In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default.
CVE-2020-11792 1 Netgear 8 R8900, R8900 Firmware, R9000 and 5 more 2020-04-21 5.0 MEDIUM 7.5 HIGH
NETGEAR R8900, R9000, RAX120, and XR700 devices before 2020-01-20 are affected by Transport Layer Security (TLS) certificate private key disclosure.
CVE-2019-4654 2 Ibm, Linux 2 Qradar Security Information And Event Manager, Linux Kernel 2020-04-20 5.8 MEDIUM 4.8 MEDIUM
IBM QRadar 7.3.0 to 7.3.3 Patch 2 does not validate, or incorrectly validates, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-ForceID: 170965.
CVE-2011-3024 1 Google 1 Chrome 2020-04-16 4.3 MEDIUM N/A
Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service (application crash) via an empty X.509 certificate.
CVE-2019-1010206 1 Http Request Project 1 Http Request 2020-04-14 4.3 MEDIUM 5.9 MEDIUM
OSS Http Request (Apache Cordova Plugin) 6 is affected by: Missing SSL certificate validation. The impact is: certificate spoofing. The component is: use this library when https communication. The attack vector is: certificate spoofing.
CVE-2011-3061 1 Google 1 Chrome 2020-04-14 5.8 MEDIUM N/A
Google Chrome before 18.0.1025.142 does not properly check X.509 certificates before use of a SPDY proxy, which might allow man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.
CVE-2018-11751 1 Puppet 1 Puppet Server 2020-04-07 4.8 MEDIUM 5.4 MEDIUM
Previous versions of Puppet Agent didn't verify the peer in the SSL connection prior to downloading the CRL. This issue is resolved in Puppet Agent 6.4.0.
CVE-2020-1887 1 Linuxfoundation 1 Osquery 2020-04-03 5.8 MEDIUM 9.1 CRITICAL
Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
CVE-2019-3762 1 Dell 2 Emc Data Protection Central, Emc Integrated Data Protection Appliance 2020-03-27 5.0 MEDIUM 7.5 HIGH
Data Protection Central versions 1.0, 1.0.1, 18.1, 18.2, and 19.1 contains an Improper Certificate Chain of Trust Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by obtaining a CA signed certificate from Data Protection Central to impersonate a valid system to compromise the integrity of data.