Lucene search

K
certCERTVU:690343
HistoryJul 05, 2016 - 12:00 a.m.

Acer Portal app for Android does not properly validate SSL certificates

2016-07-0500:00:00
www.kb.cert.org
12

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

56.6%

Overview

The Acer Portal app for Android allows customers to connect to the Acer Cloud. The Acer Portal app, from version 3.9.3.2003 to 3.9.3.2006, does not properly validate SSL certificates when connecting to the Acer Cloud.

Description

CVE-2016-5648**-** CWE-295: Improper Certificate Validation

The Acer Portal app for Android, from version 3.9.3.2003 to 3.9.3.2006, does not properly validate SSL certificates when connecting to the Acer Cloud. A remote unauthenticated attacker capable of conducting a man-in-the-middle attack may be able to impersonate the Acer Cloud and obtain a victim’s account credentials or other cloud information.


Impact

A remote unauthenticated attacker capable of conducting a man-in-the-middle attack may be able to impersonate the Acer Cloud and obtain a victim’s account credentials or other cloud information.


Solution

Apply an update

Acer Portal version 3.9.4.2000 addresses this vulnerability and is now available on Google Play. Users are encouraged to update as soon as possible.


Vendor Information

690343

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Acer Affected

Notified: June 02, 2016 Updated: July 05, 2016

Statement Date: July 01, 2016

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N
Temporal 4.5 E:POC/RL:OF/RC:C
Environmental 3.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

<http://www.info-sec.ca/advisories/Acer-Portal.html&gt;

Acknowledgements

Thanks to David Coomber for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2016-5648
Date Public: 2016-07-05 Date First Published:

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

56.6%

Related for VU:690343