lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 13 Jan 2018 17:16:23 +0100 From: Summer of Pwnage via Fulldisclosure <fulldisclosure@...lists.org> To: fulldisclosure@...lists.org Subject: [FD] Broken TLS certificate validation in VTech DigiGo browser ------------------------------------------------------------------------ Broken TLS certificate validation in VTech DigiGo browser ------------------------------------------------------------------------ Sipke Mellema, September 2017 ------------------------------------------------------------------------ Abstract ------------------------------------------------------------------------ VTech's DigiGo is a hand held smart device for children. The web browser included in the DigiGo does not validate TLS certificates when creating secure connections, allowing man in the middle attacks on web traffic. ------------------------------------------------------------------------ Tested versions ------------------------------------------------------------------------ This issue was tested on a VTech DigiGo running firmware version 83.60630. It is likely that other versions are also affected. ------------------------------------------------------------------------ Fix ------------------------------------------------------------------------ VTech pushed a firmware update to address this issue on 30 November, 2017. The firmware version still displays as 83.60630. ------------------------------------------------------------------------ Details ------------------------------------------------------------------------ https://sumofpwn.nl/advisory/2017/broken-tls-certificate-validation-in-vtech-digigo-browser.html _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists