Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
References
Configurations
Configuration 1 (hide)
|
History
04 Jan 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed - Vendor Advisory | |
First Time |
Eset smart Security
Eset security Eset internet Security Eset nod32 Antivirus Eset file Security Eset server Security Eset endpoint Security Eset endpoint Antivirus Eset mail Security Eset |
|
CPE | cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:* cpe:2.3:a:eset:server_security:*:*:*:*:*:linux:*:* cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:* cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:* cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:* cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:* cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:*:*:*:* cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:* cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:* cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux:*:* cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:* cpe:2.3:a:eset:security:-:*:*:*:ultimate:*:*:* cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:* |
|
CWE | CWE-295 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
21 Dec 2023, 13:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-21 12:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-5594
Mitre link : CVE-2023-5594
CVE.ORG link : CVE-2023-5594
JSON object : View
Products Affected
eset
- smart_security
- nod32_antivirus
- file_security
- endpoint_security
- server_security
- internet_security
- mail_security
- security
- endpoint_antivirus
CWE
CWE-295
Improper Certificate Validation