Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust.
2020-03-13T00:15:11.557
2024-11-21T05:11:32.900
Modified
CVSSv3.1: 9.1 (CRITICAL)
AV:N/AC:M/Au:N/C:P/I:P/A:N
8.6
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | linuxfoundation | osquery | < 4.2.0 | Yes |