First published: Wed Oct 15 2014(Updated: )
The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=32.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1584 is classified as a medium severity vulnerability.
CVE-2014-1584 allows attackers to bypass public key pinning checks, which can lead to spoofing of websites.
To mitigate CVE-2014-1584, upgrade Mozilla Firefox to version 33.0 or later.
CVE-2014-1584 affects Mozilla Firefox versions prior to 33.0, specifically versions 30.0, 31.0, 31.1.0, and 32.0.
CVE-2014-1584 is not considered critical, but it poses a significant security risk that should be addressed.