Vulnerability Description
The Chase mobile banking application for Android does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to overriding the default X509TrustManager. NOTE: this vulnerability was fixed in the summer of 2012, but the version number was not changed or is not known.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jpmorganchase | Chase Mobile | - |
Related Weaknesses (CWE)
References
- http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdfExploit
- https://docs.google.com/document/pub?id=1roBIeSJsYq3Ntpf6N0PIeeAAvu4ddn7mGo6Qb7aBroken Link
- http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdfExploit
- https://docs.google.com/document/pub?id=1roBIeSJsYq3Ntpf6N0PIeeAAvu4ddn7mGo6Qb7aBroken Link
FAQ
What is CVE-2012-5810?
CVE-2012-5810 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The Chase mobile banking application for Android does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, whic...
How severe is CVE-2012-5810?
CVE-2012-5810 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-5810?
Check the references section above for vendor advisories and patch information. Affected products include: Jpmorganchase Chase Mobile.