Lucene search

K
vulnrichmentProgressSoftwareVULNRICHMENT:CVE-2024-7346
HistorySep 03, 2024 - 2:51 p.m.

CVE-2024-7346 Client connections using default TLS certificates from OpenEdge may bypass TLS host name validation

2024-09-0314:51:03
CWE-297
ProgressSoftware
github.com
1
cve-2024-7346
openedge
tls certificates
bypass
host name validation
network security
ca-signed certificates

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.  This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.  The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*"
    ],
    "vendor": "progress",
    "product": "openedge",
    "versions": [
      {
        "status": "affected",
        "version": "11.7.0",
        "versionType": "custom",
        "lessThanOrEqual": "11.7.19"
      },
      {
        "status": "affected",
        "version": "12.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "12.2.14"
      },
      {
        "status": "unaffected",
        "version": "12.8.0"
      }
    ],
    "defaultStatus": "affected"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-7346