Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.  This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.  The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation.
History

Thu, 05 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
CPEs cpe:2.3:a:progress:openedge:*:*:*:*:lts:*:*:*

Tue, 03 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress openedge
CPEs cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*
Vendors & Products Progress
Progress openedge
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Sep 2024 15:00:00 +0000

Type Values Removed Values Added
Description Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.  This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.  The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation.
Title Client connections using default TLS certificates from OpenEdge may bypass TLS host name validation
Weaknesses CWE-297
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published: 2024-09-03T14:51:03.551Z

Updated: 2024-09-03T15:06:04.578Z

Reserved: 2024-07-31T17:32:10.370Z

Link: CVE-2024-7346

cve-icon Vulnrichment

Updated: 2024-09-03T15:05:02.299Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-03T15:15:16.913

Modified: 2024-09-05T14:03:24.040

Link: CVE-2024-7346

cve-icon Redhat

No data.