CVE-2022-45419 — Improper Certificate Validation in Mozilla Firefox
Severity
6.5MEDIUMNVD
OSV8.1
EPSS
0.1%
top 75.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 22
Description
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages6 packages
🔴Vulnerability Details
3GHSA▶
GHSA-qg25-r8rj-7fhp: If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and↗2022-12-22
OSV▶
CVE-2022-45419: If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and↗2022-11-16
📋Vendor Advisories
4Microsoft▶
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kep↗2022-12-13
Debian▶
CVE-2022-45419: firefox - If the user added a security exception for an invalid TLS certificate, opened an...↗2022