Vulnerability Details : CVE-2019-14823
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to attacks such as Man in the Middle.
Products affected by CVE-2019-14823
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.8:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.10:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- Jss Cryptomanager Project » Jss CryptomanagerVersions from including (>=) 4.5.3 and up to, including, (<=) 4.5.4cpe:2.3:a:jss_cryptomanager_project:jss_cryptomanager:*:*:*:*:*:*:*:*
- Jss Cryptomanager Project » Jss CryptomanagerVersions from including (>=) 4.4.6 and up to, including, (<=) 4.4.7cpe:2.3:a:jss_cryptomanager_project:jss_cryptomanager:*:*:*:*:*:*:*:*
- Jss Cryptomanager Project » Jss CryptomanagerVersions from including (>=) 4.6.0 and up to, including, (<=) 4.6.2cpe:2.3:a:jss_cryptomanager_project:jss_cryptomanager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-14823
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-14823
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
6.8
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N |
1.6
|
5.2
|
Red Hat, Inc. | |
7.4
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
NIST |
CWE ids for CVE-2019-14823
-
The product does not validate, or incorrectly validates, a certificate.Assigned by: nvd@nist.gov (Secondary)
-
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.Assigned by: secalert@redhat.com (Primary)
References for CVE-2019-14823
-
https://access.redhat.com/errata/RHSA-2019:3225
RHSA-2019:3225 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEN4DQBE6WOGEP5BQ5X62WZM7ZQEEBG/
[SECURITY] Fedora 31 Update: jss-4.6.2-1.fc31 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O53NXVKMF7PJCPMCJQHLMSYCUGDHGBVE/
[SECURITY] Fedora 30 Update: jss-4.6.2-1.fc30 - package-announce - Fedora Mailing-Lists
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14823
1747435 – (CVE-2019-14823) CVE-2019-14823 JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificateIssue Tracking;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZZWZLNALV6AOIBIHB3ZMNA5AGZMZAIY/
[SECURITY] Fedora 29 Update: jss-4.6.2-1.fc29 - package-announce - Fedora Mailing-Lists
-
https://access.redhat.com/errata/RHSA-2019:3067
RHSA-2019:3067 - Security Advisory - Red Hat Customer PortalExploit;Patch;Third Party Advisory
Jump to