CVE-2023-5594
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: low
Availability: none
Description
AI Translation Available
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0010
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
295
Improper Certificate Validation
DraftCommon Consequences
Security Scopes Affected:
Integrity
Authentication
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Applicable Platforms
Technologies:
Mobile, Not Technology-Specific, Web Based
Application
Endpoint Antivirus by Eset
Version Range Affected
From
10.0
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
File Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Smart Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Endpoint Antivirus by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Mail Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Nod32 Antivirus by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Server Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Server Security by Eset
Version Range Affected
From
10.1
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:server_security:*:*:*:*:*:linux:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Endpoint Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Mail Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Internet Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Security by Eset
CPE Identifier
View Detailed Analysis
cpe:2.3:a:eset:security:-:*:*:*:ultimate:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of…
https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of…