Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-295 (证书验证不恰当) — Vulnerability Class 474

474 vulnerabilities classified as CWE-295 (证书验证不恰当). AI Chinese analysis included.

CWE-295 represents a critical cryptographic weakness where software fails to properly validate digital certificates, undermining the integrity of secure communications. Attackers typically exploit this flaw by performing man-in-the-middle attacks, intercepting traffic between a client and server. By presenting a forged or invalid certificate, adversaries can decrypt sensitive data, inject malicious content, or impersonate legitimate services without detection. This vulnerability is particularly dangerous in applications relying on Transport Layer Security for confidentiality. To prevent such breaches, developers must implement rigorous certificate validation mechanisms, ensuring that the presented certificate is signed by a trusted Certificate Authority and matches the expected hostname. Additionally, enabling Certificate Pinning and strictly rejecting expired or revoked certificates further hardens the application against interception attempts, thereby preserving the authenticity and security of the data exchange.

MITRE CWE Description
The product does not validate, or incorrectly validates, a certificate.
Common Consequences (1)
Integrity, AuthenticationBypass Protection Mechanism, Gain Privileges or Assume Identity
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The product might connect to a malicious host while believing it is a trusted host, or the product might be deceived into accepting s…
Mitigations (2)
Architecture and Design, ImplementationCertificates should be carefully managed and checked to assure that data are encrypted with the intended owner's public key.
ImplementationIf certificate pinning is being used, ensure that all relevant properties of the certificate are fully validated before the certificate is pinned, including the hostname.
Examples (2)
This code checks the certificate of a connected peer.
if ((cert = SSL_get_peer_certificate(ssl)) && host) foo=SSL_get_verify_result(ssl); if ((X509_V_OK==foo) || X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN==foo)) // certificate looks good, host can be trusted
Bad · C
The following OpenSSL code obtains a certificate and verifies it.
cert = SSL_get_peer_certificate(ssl); if (cert && (SSL_get_verify_result(ssl)==X509_V_OK)) { // do secret things }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-58781 WTW-EAGLE App 信任管理问题漏洞 — WTW-EAGLE App for iOS 5.9 -2025-09-12
CVE-2025-9785 Misconfigured certificate validation with self-signed certificates for Print Deploy — Print Deploy 7.4AIHighAI2025-09-03
CVE-2025-33099 IBM Concert Software information disclosure — Concert Software 5.9 Medium2025-09-01
CVE-2025-30278 Qsync Central — Qsync Central 7.4 -2025-08-29
CVE-2025-30277 Qsync Central — Qsync Central 7.4 -2025-08-29
CVE-2025-58127 Lack of TLS validation in plugin Dell Powerscale on Checkmk Exchange 5.9AIMediumAI2025-08-28
CVE-2025-58126 Lack of TLS validation in plugin VMware vSAN on Checkmk Exchange 5.9AIMediumAI2025-08-28
CVE-2025-58125 Lack of TLS validation in plugin Freebox v6 agent on Checkmk Exchange 5.9AIMediumAI2025-08-28
CVE-2025-58124 Lack of TLS validation in plugin check-mk-api on Checkmk Exchange 5.9AIMediumAI2025-08-28
CVE-2025-58123 Lack of TLS validation in plugin BGP Monitoring on Checkmk Exchange --AI2025-08-28
CVE-2025-7390 Bypass the client certificate trust check of an opc.https server while only secure communication is allowed — OPC UA C++ SDK 9.1 Critical2025-08-21
CVE-2025-33142 IBM WebSphere Application Server information disclosure — WebSphere Application Server 5.3 Medium2025-08-14
CVE-2025-2183 GlobalProtect App: Improper Certificate Validation Leads to Privilege Escalation — GlobalProtect App 8.0AIHighAI2025-08-13
CVE-2025-54809 F5 Access for Android vulnerability — F5 Access 7.4 High2025-08-13
CVE-2025-8393 Dreame Technology iOS and Android Mobile Applications Improper Certificate Validation — Dreamehome iOS app 7.3 High2025-08-08
CVE-2025-20215 Cisco Webex Meeting Client Join Certificate Validation Vulnerability — Cisco Webex Meetings 5.4 Medium2025-08-06
CVE-2025-48393 Eaton Rack PDU G4 安全漏洞 — G4 PDU 5.7 Medium2025-08-06
CVE-2025-2028 Lack of TLS validation — Check Point Management Log Server 6.5 Medium2025-08-06
CVE-2025-54607 Huawei HarmonyOS 安全漏洞 — HarmonyOS 7.7 High2025-08-06
CVE-2025-6037 Vault Certificate Auth Method Did Not Validate Common Name For Non-CA Certificates — Vault 6.8 Medium2025-08-01
CVE-2025-8476 Alpine iLX-507 TIDAL Improper Certificate Validation Vulnerability — iLX-507 8.8 -2025-08-01
CVE-2025-36005 IBM MQ Operator information disclosure — MQ Operator 5.9 Medium2025-07-24
CVE-2025-7395 Domain Name Validation Bypass with Apple Native Certificate Validation — wolfSSL 7.5 -2025-07-18
CVE-2025-30024 AXIS Device Manager 安全漏洞 — AXIS Device Manager 6.8 Medium2025-07-11
CVE-2025-46788 Zoom Workplace for Linux - Improper Certificate Validation — Zoom Workplace for Linux 7.4 High2025-07-10
CVE-2025-32989 Gnutls: vulnerability in gnutls sct extension parsing 5.3 Medium2025-07-10
CVE-2025-35983 Gallagher Controller 7000 信任管理问题漏洞 — Controller 7000 6.5 Medium2025-07-10
CVE-2025-48802 Windows SMB Server Spoofing Vulnerability — Windows 11 version 22H2 6.5 Medium2025-07-08
CVE-2024-31854 Siemens SICAM TOOLBOX II 信任管理问题漏洞 — SICAM TOOLBOX II 8.1 High2025-07-08
CVE-2024-31853 Siemens SICAM TOOLBOX II 信任管理问题漏洞 — SICAM TOOLBOX II 8.1 High2025-07-08

Vulnerabilities classified as CWE-295 (证书验证不恰当) represent 474 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.