ID CVE-2014-6881
Summary The PNC Virtual Wallet (aka com.pnc.ecommerce.mobile.vw.android) application before 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:pnc:virtual_wallet_by_pnc:*:*:*:*:*:android:*:*
    cpe:2.3:a:pnc:virtual_wallet_by_pnc:*:*:*:*:*:android:*:*
CVSS
Base: 5.4 (as of 16-10-2014 - 07:27)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
ADJACENT_NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:A/AC:M/Au:N/C:P/I:P/A:P
refmap via4
cert-vn
  • VU#168457
  • VU#582497
confirm http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6881
misc https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
statements via4
contributor PNC
lastmodified 2014-10-08
organization PNC
statement The PNC Virtual Wallet (aka com.pnc.ecommerce.mobile.vw.android application 2.1.1 for Android has been replaced by PNC Virtual Wallet 2.2. Version 2.1.1 is no longer available for use."
Last major update 16-10-2014 - 07:27
Published 02-10-2014 - 10:55
Last modified 16-10-2014 - 07:27
Back to Top