CVE-2024-7346

Sept. 3, 2024, 7:40 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

OpenEdge

Source

security@progress.com

Tags

CVE-2024-7346 details

Published : Sept. 3, 2024, 3:15 p.m.
Last Modified : Sept. 3, 2024, 7:40 p.m.

Description

Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.  This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.  The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation.

CVSS Score

1 2 3 4 5 6 7.2 8 9 10

Weakness

Weakness Name Description
CWE-297 Improper Validation of Certificate with Host Mismatch The product communicates with a host that provides a certificate, but the product does not properly ensure that the certificate is actually associated with that host.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

Base Score

7.2

Exploitability Score

3.9

Impact Score

2.7

Base Severity

HIGH

This website uses the NVD API, but is not approved or certified by it.