First published: Sun Oct 19 2014(Updated: )
The DealSide Institutional (aka com.magzter.dealsideinstitutional) application 3.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Magzter Dealside Institutional | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-7448 is considered to be high due to its potential for man-in-the-middle attacks.
CVE-2014-7448 affects the DealSide Institutional application by not verifying SSL server certificates, which can allow attackers to intercept sensitive information.
To fix CVE-2014-7448, update the DealSide Institutional application to a version that implements proper SSL certificate validation.
CVE-2014-7448 impacts the Magzter Dealside Institutional application version 3.1 on Android devices.
A temporary workaround for CVE-2014-7448 is to avoid using the affected application on unsecured networks until an update is applied.