Lucene search

K
cve[email protected]CVE-2014-1582
HistoryOct 15, 2014 - 10:55 a.m.

CVE-2014-1582

2014-10-1510:55:06
CWE-310
web.nvd.nist.gov
32
cve-2014-1582
public key pinning
pkp
mozilla firefox
spdy
http/2
man-in-the-middle
certification authority

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.4%

The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.

Affected configurations

NVD
Node
mozillafirefoxRange32.0
OR
mozillafirefoxMatch30.0
OR
mozillafirefoxMatch31.0
OR
mozillafirefoxMatch31.1.0

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.4%