First published: Sat Apr 02 2022(Updated: )
WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WeeChat | >=3.2<3.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28352 is considered a critical vulnerability due to its potential to allow man-in-the-middle attacks.
To fix CVE-2022-28352, upgrade WeeChat to version 3.4.1 or later, which properly verifies TLS certificates.
CVE-2022-28352 affects WeeChat versions 3.2 through 3.4 before 3.4.1.
CVE-2022-28352 is a TLS certificate verification vulnerability that can be exploited for man-in-the-middle attacks.
Users of WeeChat versions 3.2 to 3.4 prior to 3.4.1 are at risk of being affected by CVE-2022-28352.