First published: Wed Oct 15 2014(Updated: )
The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=32.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1582 has a medium threat level, as it allows man-in-the-middle attacks due to improper key pinning implementation.
To fix CVE-2014-1582, update Mozilla Firefox to version 33.0 or later.
CVE-2014-1582 affects Firefox versions earlier than 33.0, including version 30.0, 31.0, and 31.1.0.
CVE-2014-1582 allows attackers to bypass public key pinning, potentially allowing them to spoof secure websites.
Users of affected versions of Mozilla Firefox are at risk of man-in-the-middle attacks due to this vulnerability.