Vulnerability Details CVE-2014-3623
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does not properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.016
EPSS Ranking 80.7%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2014-3623
-
cpe:2.3:a:apache:cxf:2.7.0
-
cpe:2.3:a:apache:cxf:2.7.1
-
cpe:2.3:a:apache:cxf:2.7.10
-
cpe:2.3:a:apache:cxf:2.7.11
-
cpe:2.3:a:apache:cxf:2.7.12
-
cpe:2.3:a:apache:cxf:2.7.13
-
cpe:2.3:a:apache:cxf:2.7.2
-
cpe:2.3:a:apache:cxf:2.7.3
-
cpe:2.3:a:apache:cxf:2.7.4
-
cpe:2.3:a:apache:cxf:2.7.5
-
cpe:2.3:a:apache:cxf:2.7.6
-
cpe:2.3:a:apache:cxf:2.7.7
-
cpe:2.3:a:apache:cxf:2.7.8
-
cpe:2.3:a:apache:cxf:2.7.9
-
cpe:2.3:a:apache:cxf:3.0.0
-
cpe:2.3:a:apache:cxf:3.0.1
-
cpe:2.3:a:apache:wss4j:1.0.0
-
cpe:2.3:a:apache:wss4j:1.1.0
-
cpe:2.3:a:apache:wss4j:1.5.0
-
cpe:2.3:a:apache:wss4j:1.5.1
-
cpe:2.3:a:apache:wss4j:1.5.10
-
cpe:2.3:a:apache:wss4j:1.5.11
-
cpe:2.3:a:apache:wss4j:1.5.12
-
cpe:2.3:a:apache:wss4j:1.5.2
-
cpe:2.3:a:apache:wss4j:1.5.3
-
cpe:2.3:a:apache:wss4j:1.5.4
-
cpe:2.3:a:apache:wss4j:1.5.5
-
cpe:2.3:a:apache:wss4j:1.5.6
-
cpe:2.3:a:apache:wss4j:1.5.7
-
cpe:2.3:a:apache:wss4j:1.5.8
-
cpe:2.3:a:apache:wss4j:1.5.9
-
cpe:2.3:a:apache:wss4j:1.6.0
-
cpe:2.3:a:apache:wss4j:1.6.1
-
cpe:2.3:a:apache:wss4j:1.6.10
-
cpe:2.3:a:apache:wss4j:1.6.11
-
cpe:2.3:a:apache:wss4j:1.6.12
-
cpe:2.3:a:apache:wss4j:1.6.13
-
cpe:2.3:a:apache:wss4j:1.6.14
-
cpe:2.3:a:apache:wss4j:1.6.15
-
cpe:2.3:a:apache:wss4j:1.6.16
-
cpe:2.3:a:apache:wss4j:1.6.2
-
cpe:2.3:a:apache:wss4j:1.6.3
-
cpe:2.3:a:apache:wss4j:1.6.4
-
cpe:2.3:a:apache:wss4j:1.6.5
-
cpe:2.3:a:apache:wss4j:1.6.6
-
cpe:2.3:a:apache:wss4j:1.6.7
-
cpe:2.3:a:apache:wss4j:1.6.8
-
cpe:2.3:a:apache:wss4j:1.6.9
-
cpe:2.3:a:apache:wss4j:2.0.0
-
cpe:2.3:a:apache:wss4j:2.0.1