Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
References
Configurations
Configuration 1 (hide)
|
History
04 Jan 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
CPE | cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:* cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux:*:* cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:* cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:* cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:* cpe:2.3:a:eset:server_security:*:*:*:*:*:linux:*:* cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:*:*:*:* cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:* cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:* cpe:2.3:a:eset:security:-:*:*:*:ultimate:*:*:* cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:* cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:* cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:* |
|
First Time |
Eset file Security
Eset server Security Eset mail Security Eset nod32 Antivirus Eset smart Security Eset security Eset endpoint Antivirus Eset internet Security Eset endpoint Security Eset |
21 Dec 2023, 13:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-21 12:15
Updated : 2024-01-04 13:50
NVD link : CVE-2023-5594
Mitre link : CVE-2023-5594
CVE.ORG link : CVE-2023-5594
JSON object : View
Products Affected
eset
- internet_security
- endpoint_antivirus
- nod32_antivirus
- endpoint_security
- smart_security
- server_security
- security
- mail_security
- file_security
CWE
CWE-295
Improper Certificate Validation