Vulnerabilities > Improper Certificate Validation

DATE CVE VULNERABILITY TITLE RISK
2024-07-09 CVE-2024-33509 Improper Certificate Validation vulnerability in Fortinet Fortiweb
An improper certificate validation vulnerability [CWE-295] in FortiWeb 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all versions and 6.3 all versions may allow a remote and unauthenticated attacker in a Man-in-the-Middle position to decipher and/or tamper with the communication channel between the device and different endpoints used to fetch data for Web Application Firewall (WAF).
network
high complexity
fortinet CWE-295
4.8
2024-06-28 CVE-2024-25053 Improper Certificate Validation vulnerability in IBM Cognos Analytics
IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, and 12.0.2 is vulnerable to improper certificate validation when using the IBM Planning Analytics Data Source Connection.
network
high complexity
ibm CWE-295
5.9
2024-06-11 CVE-2024-28021 Improper Certificate Validation vulnerability in Hitachienergy Foxman-Un, Foxman UN and Unem
A vulnerability exists in the FOXMAN-UN/UNEM server that affects the message queueing mechanism’s certificate validation.
network
high complexity
hitachienergy CWE-295
7.4
2024-02-15 CVE-2023-47537 Improper Certificate Validation vulnerability in Fortinet Fortios
An improper certificate validation vulnerability in Fortinet FortiOS 7.0.0 - 7.0.13, 7.2.0 - 7.2.6, 7.4.0 - 7.4.1 and 6.4 all versions allows a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the FortiLink communication channel between the FortiOS device and FortiSwitch.
network
high complexity
fortinet CWE-295
4.8
2024-02-13 CVE-2024-25642 Improper Certificate Validation vulnerability in SAP Cloud Connector 2.0
Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication.
network
high complexity
sap CWE-295
7.4
2024-02-07 CVE-2023-32330 Improper Certificate Validation vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure calls that could allow an attacker on the network to take control of the server.
network
low complexity
ibm CWE-295
critical
9.8
2024-02-07 CVE-2023-43017 Improper Certificate Validation vulnerability in IBM Security Verify Access
IBM Security Verify Access 10.0.0.0 through 10.0.6.1 could allow a privileged user to install a configuration file that could allow remote access.
network
low complexity
ibm CWE-295
7.2
2024-02-07 CVE-2023-47700 Improper Certificate Validation vulnerability in IBM Storage Virtualize 8.6
IBM SAN Volume Controller, IBM Storwize, IBM FlashSystem and IBM Storage Virtualize 8.6 products could allow a remote attacker to spoof a trusted system that would not be correctly validated by the Storwize server.
network
low complexity
ibm CWE-295
7.5
2024-02-06 CVE-2024-25140 Improper Certificate Validation vulnerability in Rustdesk 1.2.3
A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033.
network
low complexity
rustdesk CWE-295
critical
9.8
2024-02-05 CVE-2024-1052 Improper Certificate Validation vulnerability in Hashicorp Boundary
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering.
network
high complexity
hashicorp CWE-295
8.0