First published: Tue Jul 08 2014(Updated: )
Microsoft Internet Explorer 7 through 11 does not prevent use of wildcard EV SSL certificates, which might allow remote attackers to spoof a trust level by leveraging improper issuance of a wildcard certificate by a recognized Certification Authority, aka "Extended Validation (EV) Certificate Security Feature Bypass Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =7 | |
Internet Explorer | =8 | |
Internet Explorer | =9 | |
Internet Explorer | =10 | |
Internet Explorer | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2783 has a moderate severity rating due to its potential to allow spoofing attacks via improper wildcard EV SSL certificate issuance.
To mitigate CVE-2014-2783, users should upgrade to a more recent and secure version of Internet Explorer that addresses this vulnerability.
CVE-2014-2783 affects Internet Explorer versions 7, 8, 9, 10, and 11.
The primary risk associated with CVE-2014-2783 is the potential for attackers to impersonate trusted entities using illegitimately issued wildcard EV SSL certificates.
Microsoft has not released a specific patch for CVE-2014-2783; the best approach is to use a supported version of Internet Explorer.