Vulnerability Description
The My nTelos (aka com.telespree.ntelospostpay) application 1.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: nTelos Wireless has indicated that this vulnerability report is incorrect
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nteloswireless | My Ntelos | 1.1.2 |
Related Weaknesses (CWE)
References
- http://www.kb.cert.org/vuls/id/582497US Government Resource
- http://www.kb.cert.org/vuls/id/898593US Government Resource
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF
- http://www.kb.cert.org/vuls/id/582497US Government Resource
- http://www.kb.cert.org/vuls/id/898593US Government Resource
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF
FAQ
What is CVE-2014-7042?
CVE-2014-7042 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The My nTelos (aka com.telespree.ntelospostpay) application 1.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain ...
How severe is CVE-2014-7042?
CVE-2014-7042 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-7042?
Check the references section above for vendor advisories and patch information. Affected products include: Nteloswireless My Ntelos.