First published: Tue Apr 22 2014(Updated: )
wolfSSL CyaSSL before 2.9.4 does not properly validate X.509 certificates with unknown critical extensions, which allows man-in-the-middle attackers to spoof servers via crafted X.509 certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
yaSSL | <=2.9.0 | |
yaSSL | =0.2.0 | |
yaSSL | =0.3.0 | |
yaSSL | =0.4.0 | |
yaSSL | =0.5.0 | |
yaSSL | =0.5.5 | |
yaSSL | =0.6.0 | |
yaSSL | =0.6.2 | |
yaSSL | =0.6.3 | |
yaSSL | =0.8.0 | |
yaSSL | =0.9.0 | |
yaSSL | =0.9.6 | |
yaSSL | =0.9.8 | |
yaSSL | =0.9.9 | |
yaSSL | =1.0.0-rc1 | |
yaSSL | =1.0.0-rc2 | |
yaSSL | =1.0.0-rc3 | |
yaSSL | =1.0.2 | |
yaSSL | =1.0.3 | |
yaSSL | =1.0.6 | |
yaSSL | =1.1.0 | |
yaSSL | =1.2.0 | |
yaSSL | =1.3.0 | |
yaSSL | =1.4.0 | |
yaSSL | =1.5.0 | |
yaSSL | =1.5.4 | |
yaSSL | =1.5.6 | |
yaSSL | =1.6.0 | |
yaSSL | =1.6.5 | |
yaSSL | =1.8.0 | |
yaSSL | =1.9.0 | |
yaSSL | =2.0.0-rc1 | |
yaSSL | =2.0.0-rc2 | |
yaSSL | =2.0.0-rc3 | |
yaSSL | =2.0.2 | |
yaSSL | =2.0.6 | |
yaSSL | =2.0.8 | |
yaSSL | =2.2.0 | |
yaSSL | =2.3.0 | |
yaSSL | =2.4.0 | |
yaSSL | =2.4.6 | |
yaSSL | =2.5.0 | |
yaSSL | =2.6.0 | |
yaSSL | =2.7.0 | |
yaSSL | =2.8.0 | |
<=2.9.0 | ||
=0.2.0 | ||
=0.3.0 | ||
=0.4.0 | ||
=0.5.0 | ||
=0.5.5 | ||
=0.6.0 | ||
=0.6.2 | ||
=0.6.3 | ||
=0.8.0 | ||
=0.9.0 | ||
=0.9.6 | ||
=0.9.8 | ||
=0.9.9 | ||
=1.0.0-rc1 | ||
=1.0.0-rc2 | ||
=1.0.0-rc3 | ||
=1.0.2 | ||
=1.0.3 | ||
=1.0.6 | ||
=1.1.0 | ||
=1.2.0 | ||
=1.3.0 | ||
=1.4.0 | ||
=1.5.0 | ||
=1.5.4 | ||
=1.5.6 | ||
=1.6.0 | ||
=1.6.5 | ||
=1.8.0 | ||
=1.9.0 | ||
=2.0.0-rc1 | ||
=2.0.0-rc2 | ||
=2.0.0-rc3 | ||
=2.0.2 | ||
=2.0.6 | ||
=2.0.8 | ||
=2.2.0 | ||
=2.3.0 | ||
=2.4.0 | ||
=2.4.6 | ||
=2.5.0 | ||
=2.6.0 | ||
=2.7.0 | ||
=2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2900 allows man-in-the-middle attackers to spoof servers via crafted X.509 certificates due to improper validation of unknown critical extensions.
CVE-2014-2900 affects all versions of CyaSSL before 2.9.4.
To mitigate CVE-2014-2900, upgrade CyaSSL to version 2.9.4 or later, which fixes the improper certificate validation issue.
Yes, CVE-2014-2900 is considered to have a high severity due to its potential for exploitation in man-in-the-middle attacks.
If you are unable to upgrade, consider implementing additional network security measures such as using VPNs or other protocols to protect against man-in-the-middle attacks.