#VU61607 Improper Certificate Validation in ZAP


Published: 2022-03-24

Vulnerability identifier: #VU61607

Vulnerability risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-27820

CWE-ID: CWE-295

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
ZAP
Client/Desktop applications / Software for system administration

Vendor: OWASP

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing TLS certificate chain validation. A remote attacker can perform MitM attack and intercept communication between the ZAP proxy and the server.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

ZAP: 1.0.0 - w2022-03-21


External links
http://www.openwall.com/lists/oss-security/2022/03/23/1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability