CVE-2022-45419
CVSS V2 None
CVSS V3 None
Description
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.
Overview
- CVE ID
- CVE-2022-45419
- Assigner
- security@mozilla.org
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-22T20:15:45
- Last Modified Date
- 2023-01-04T18:10:35
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 1 | OR | 107.0 |
References
Reference URL | Reference Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1716082 | |
https://www.mozilla.org/security/advisories/mfsa2022-47/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-45419 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45419 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-22 21:15:54 | Added to TrackCVE | |||
2022-12-22 22:15:35 | 2022-12-22T21:43:11 | CVE Modified Date | updated | |
2022-12-22 22:15:35 | Received | Awaiting Analysis | Vulnerability Status | updated |
2022-12-28 16:16:56 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-04 18:20:43 | 2023-01-04T18:10:35 | CVE Modified Date | updated | |
2023-01-04 18:20:43 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-04 18:20:43 | Weakness Enumeration | new | ||
2023-01-04 18:20:44 | CPE Information | updated |