An exploitable vulnerability exists in the HTTP client functionality of the Webroot BrightCloud SDK. The configuration of the HTTP client does not enforce a secure connection by default, resulting in a failure to validate TLS certificates. An attacker could impersonate a remote BrightCloud server to exploit this vulnerability.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0686 | third party advisory |