CVE-2024-7346 Vulnerability Details

  /     /     /  

CVE-2024-7346 Metadata Quick Info

CVE Published: 03/09/2024 | CVE Updated: 03/09/2024 | CVE Year: 2024
Source: ProgressSoftware | Vendor: Progress | Product: OpenEdge
Status : PUBLISHED

CVE-2024-7346 Description

Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.  This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.  The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation.

Metrics

CVSS Version: 3.1 | Base Score: 7.2 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* LOW
    Integrity Impact (I)* LOW
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-297
CWE Name: CWE-297: Improper Validation of Certificate with Host Mismatch
Source: Progress

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-272
CAPEC Description: CAPEC-272: Protocol Manipulation


Source: NVD (National Vulnerability Database).