CVE-2020-10659

Entrust Entelligence Security Provider (ESP) before 10.0.60 on Windows mishandles errors during SSL Certificate Validation, leading to situations where (for example) a user continues to interact with a web site that has an invalid certificate chain.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:entrustdatacard:entelligence_security_provider:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://github.com/etherpacket/CVD-Applications/blob/master/EDC%20Security%20Bulletin%20E19-001a.pdf - Broken Link () https://github.com/etherpacket/CVD-Applications/blob/master/EDC%20Security%20Bulletin%20E19-001a.pdf - Broken Link
References () https://github.com/etherpacket/CVD-Applications/blob/master/eespwin_10_10060_readme.pdf - Broken Link () https://github.com/etherpacket/CVD-Applications/blob/master/eespwin_10_10060_readme.pdf - Broken Link

Information

Published : 2020-03-18 02:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10659

Mitre link : CVE-2020-10659

CVE.ORG link : CVE-2020-10659


JSON object : View

Products Affected

entrustdatacard

  • entelligence_security_provider

microsoft

  • windows
CWE
CWE-295

Improper Certificate Validation