CVE-2016-10534

Description

electron-packager is a command line tool that packages Electron source code into `.app` and `.exe` packages. along with Electron. The `--strict-ssl` command line option in electron-packager >= 5.2.1 <= 6.0.0 || >=6.0.0 <= 6.0.2 defaults to false if not explicitly set to true. This could allow an attacker to perform a man in the middle attack.

Category

5.9
CVSS
Severity: Medium
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.16%
Third-Party Advisory github.com Third-Party Advisory nodesecurity.io
Affected: HackerOne electron-packager node module
Published at:
Updated at:

References

Link Tags
https://github.com/electron-userland/electron-packager/issues/333 mitigation third party advisory issue tracking
https://nodesecurity.io/advisories/104 mitigation third party advisory

Frequently Asked Questions

What is the severity of CVE-2016-10534?
CVE-2016-10534 has been scored as a medium severity vulnerability.
How to fix CVE-2016-10534?
To fix CVE-2016-10534, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2016-10534 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2016-10534 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2016-10534?
CVE-2016-10534 affects HackerOne electron-packager node module.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.