According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server."
References
Configurations
No configuration.
History
04 Oct 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Oct 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
02 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-02 14:15
Updated : 2024-10-04 13:50
NVD link : CVE-2024-44097
Mitre link : CVE-2024-44097
CVE.ORG link : CVE-2024-44097
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management