TID-316 PUBLISHED

Certificate-based authentication depends on the correct parsing and validation of an X.509 certificate. However, if the certificate is not properly parsed and all fields are not validated, a threat actor could potentially bypass authentication using a fraudulent certificate.

Affected Products

VendorProductVersions
n/an/an/a

Timeline

References

…and 6 more

Open in Interactive Console →