U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-5102

Change History

CVE Modified by Talos 6/30/2023 2:15:09 PM

Action Type Old Value New Value
Changed Description
An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request.
An exploitable information leak vulnerability exists in the ustream-ssl library of
OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's
SSL certificate is checked but no action is taken when the certificate is invalid. An
attacker could exploit this behavior by performing a man-in-the-middle attack, providing
any certificate, leading to the theft of all the data sent by the client during the first
request.An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request.