First published: Tue Nov 15 2022(Updated: )
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <107 | 107 |
Mozilla Firefox | <107.0 | |
<107.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-45419 is a vulnerability in Mozilla Firefox that allows an attacker to keep an ongoing TLS connection alive even after the user has deleted a security exception for an invalid TLS certificate, making it seem like the certificate is still trusted.
CVE-2022-45419 affects Mozilla Firefox by allowing an attacker to deceive the user into thinking that an invalid TLS certificate is still trusted.
The severity of CVE-2022-45419 is medium, with a severity score of 6.5.
To fix CVE-2022-45419 in Mozilla Firefox, update to version 107.0 or later.
You can find more information about CVE-2022-45419 on the Mozilla website and in the associated security advisories.