First published: Thu Dec 21 2023(Updated: )
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
Credit: security@eset.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESET Endpoint Antivirus for Linux | >=10.0 | |
ESET Endpoint Antivirus | ||
ESET Endpoint Security | ||
ESET File Security for Azure | ||
ESET Internet Security | ||
ESET Mail Security for IBM Domino | ||
ESET Mail Security for Microsoft Exchange Server | ||
ESET NOD32 Antivirus | ||
ESET Mail Security for Microsoft SharePoint Server | ||
ESET Security | ||
ESET Server Security | >=10.1 | |
ESET Server Security for Windows Server | ||
ESET Smart Security for Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5594 has been classified as a medium severity vulnerability due to improper validation of the server's certificate chain.
To fix CVE-2023-5594, ensure you update your ESET security products to the latest version where the vulnerability is patched.
CVE-2023-5594 affects multiple ESET products, including ESET Endpoint Antivirus for Linux, ESET Endpoint Security for Windows, and ESET NOD32 Antivirus.
CVE-2023-5594 could allow an attacker to exploit the flaw to perform man-in-the-middle attacks by misusing intermediate certificates.
CVE-2023-5594 was disclosed in October 2023 as part of ESET's security advisory to address the vulnerability.