Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-7346


Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.  This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.  The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation.


Published

2024-09-03T15:15:16.913

Last Modified

2024-09-05T14:03:24.040

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-297
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application progress openedge ≤ 11.7.19 Yes
Application progress openedge ≤ 12.2.14 Yes

References