First published: Thu Oct 02 2014(Updated: )
The DS audio (aka com.synology.DSaudio) application 3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Ds Audio | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6868 is classified as a medium severity vulnerability due to its potential for man-in-the-middle attacks.
CVE-2014-6868 allows attackers to spoof SSL servers, potentially exposing sensitive user information.
CVE-2014-6868 specifically affects version 3.4 of the DS audio application for Android.
To fix CVE-2014-6868, it is recommended to update to the latest version of the DS audio application provided by Synology.
CVE-2014-6868 allows for man-in-the-middle attacks due to improper verification of SSL server certificates.