CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application.
CVEID:CVE-2018-20200
**DESCRIPTION:**DISPUTED CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don’t consider this is a vulnerability. Their rationale can be found in <https://github.com/square/okhttp/issues/4967>.
CVSS Base score: 0
CVSS Vector:
Affected Product(s) | Version(s) |
---|---|
Resilient OnPrem | IBM Security SOAR |
Users must upgrade to v38.0 of IBM Resilient in order to obtain a fix for this vulnerability.
You can upgrade the platform by following the instructions in the “Upgrade Procedure” section in the IBM Knowledge Center.
None