ID

VAR-201608-0085


CVE

CVE-2016-5672


TITLE

Intel CrossWalk project does not validate SSL certificates after first acceptance

Trust: 0.8

sources: CERT/CC: VU#217871

DESCRIPTION

Intel Crosswalk before 19.49.514.5, 20.x before 20.50.533.11, 21.x before 21.51.546.0, and 22.x before 22.51.549.0 interprets a user's acceptance of one invalid X.509 certificate to mean that all invalid X.509 certificates should be accepted without prompting, which makes it easier for man-in-the-middle attackers to spoof SSL servers and obtain sensitive information via a crafted certificate. Intel Crosswalk Project Is Android and iOS A framework for developing hybrid apps Crosswalk Project Is illegal SSL There is a problem in the processing when the user accepts the server certificate, and the application SSL Validation of all server certificates may be hindered. Issue that does not warn the user that the operation is unsafe (CWE-356) - CVE-2016-5672 Fraudulent SSL If a server certificate is detected, Crosswalk Project Apps created using show an error message. The user gets this error message "OK" If you select, the app SSL Server certificate verification will not be performed. The error message indicates that the app is permanently SSL It is not clearly stated that the server certificate will no longer be verified, and the same message will not be displayed again. CWE-356: Product UI does not Warn User of Unsafe Actions http://cwe.mitre.org/data/definitions/356.html Researchers are releasing more detailed information as security advisories. Also, Intel Corporation Has also created a blog post about this issue. Security advisory https://wwws.nightwatchcybersecurity.com/2016/07/29/advisory-intel-crosswalk-ssl-prompt-issue/ Blog post http://blogs.intel.com/evangelists/2016/07/28/crosswalk-security-vulnerability/Once you set to allow unauthorized server certificates, SSL Man-in-the-middle attacks where all server certificates are no longer verified (man-in-the-middle attack) May be done. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. The issue is fixed in following versions: Intel Crosswalk 19.49.514.5, 20.50.533.11, 21.51.546.0, and 22.51.549.0. Intel Crosswalk is a set of Web engines developed by Intel Corporation of the United States. [Original at: https://wwws.nightwatchcybersecurity.com/2016/07/29/advisory-intel-crosswalk-ssl-prompt-issue/] Summary The Intel Crosswalk Project library for cross-platform mobile development did not properly handle SSL errors. This behaviour could subject applications developed using this library to SSL MITM attacks. Vulnerability Details The Crosswalk Project, created by Intels Open Source Technology Center, allows mobile developers to use HTML, CSS and Javascript to develop and deploy mobile apps across multiple platforms from the same codebase. The library packages the HTML assets provided by the developer and runs them inside a WebView on the device. The library also bridges some of the common APIs and services from the Javascript code in the WebView to the underlying platform. It is implemented in multiple apps, some of which can be found here. This applies even to connections over different WiFi hotspots and different certificates. This may allow a network-level attacker to mount MITM attack using invalid SSL certificate and capture sensitive data. This issue has been fixed in the following versions of Crosswalk and all users of the library are encouraged to upgrade: - 19.49.514.5 (stable) - 20.50.533.11 (beta) - 21.51.546.0 (beta) - 22.51.549.0 (canary) This issue was originally discovered while testing a third-party Android app using this library. References CERT/CC vulnerability note: https://www.kb.cert.org/vuls/id/217871 Crosswalk security advisory: https://lists.crosswalk-project.org/pipermail/crosswalk-help/2016-July/002167.html CVE - CVE-2016-5672: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5672 Intel blog post: https://blogs.intel.com/evangelists/2016/07/28/crosswalk-security-vulnerability/ Credits Thank you to CERT/CC for coordination on this issue, and to the Intel Open Source Technology Center for the fix. Timeline 2016-05-25: Reported issue to the Intel PSIRT, got an automated reply 2016-05-30: Reached out to CERT/CC for help reaching Intel 2016-06-01: Request from CERT/CC for more details, provided details via secure form 2016-06-15: Response from CERT/CC that Intel is planning a fix within 45 days 2016-06-23: Direct contact from Intel 2016-07-01: Asking CERT/CC to reserve a CVE, CERT/CC assigns a CVE 2016-07-22: Intel fix is finished and ready for testing 2016-07-25: We confirm the fix and coordinate disclosure dates 2016-07-29: Coordinated public disclosure

Trust: 2.79

sources: NVD: CVE-2016-5672 // CERT/CC: VU#217871 // JVNDB: JVNDB-2016-004107 // BID: 92199 // VULHUB: VHN-94491 // PACKETSTORM: 138107

AFFECTED PRODUCTS

vendor:intelmodel:crosswalkscope:lteversion:19.49.514.4

Trust: 1.0

vendor:intelmodel:crosswalkscope:eqversion:19.49.514.4

Trust: 0.9

vendor:intelmodel: - scope: - version: -

Trust: 0.8

vendor:intelmodel:crosswalk projectscope:ltversion:19.49.514.5 (stable) earlier

Trust: 0.8

vendor:intelmodel:crosswalk projectscope:ltversion:20.50.533.11 (beta) earlier

Trust: 0.8

vendor:intelmodel:crosswalk projectscope:ltversion:21.51.546.0 (beta) earlier

Trust: 0.8

vendor:intelmodel:crosswalk projectscope:ltversion:22.51.549.0 (canary) earlier

Trust: 0.8

vendor:intelmodel:crosswalkscope:eqversion:22.51.552.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:22.51.551.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:22.51.550.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:21.51.546.3

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:21.51.546.2

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:21.51.546.1

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:21.50.540.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:20.50.533.9

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:20.50.533.8

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:20.50.533.12

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:20.50.533.10

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:20.50.530.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:20.49.520.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:eqversion:19.49.510.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:neversion:22.51.549.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:neversion:21.51.546.0

Trust: 0.3

vendor:intelmodel:crosswalkscope:neversion:20.50.533.11

Trust: 0.3

vendor:intelmodel:crosswalkscope:neversion:19.49.514.5

Trust: 0.3

sources: CERT/CC: VU#217871 // BID: 92199 // JVNDB: JVNDB-2016-004107 // CNNVD: CNNVD-201607-1061 // NVD: CVE-2016-5672

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5672
value: HIGH

Trust: 1.0

NVD: CVE-2016-5672
value: MEDIUM

Trust: 0.8

NVD: CVE-2016-5672
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201607-1061
value: MEDIUM

Trust: 0.6

VULHUB: VHN-94491
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-5672
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2016-5672
severity: MEDIUM
baseScore: 5.8
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-94491
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5672
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: CERT/CC: VU#217871 // VULHUB: VHN-94491 // JVNDB: JVNDB-2016-004107 // CNNVD: CNNVD-201607-1061 // NVD: CVE-2016-5672

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-310

Trust: 1.9

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-94491 // JVNDB: JVNDB-2016-004107 // NVD: CVE-2016-5672

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201607-1061

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201607-1061

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004107

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#217871

PATCH

title:Crosswalk Security Vulnerability - Intel Software and Servicesurl:http://blogs.intel.com/evangelists/2016/07/28/crosswalk-security-vulnerability/

Trust: 0.8

title:Intel Crosswalk Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63364

Trust: 0.6

sources: JVNDB: JVNDB-2016-004107 // CNNVD: CNNVD-201607-1061

EXTERNAL IDS

db:CERT/CCid:VU#217871

Trust: 3.7

db:NVDid:CVE-2016-5672

Trust: 2.9

db:BIDid:92199

Trust: 1.4

db:PACKETSTORMid:138107

Trust: 1.2

db:JVNid:JVNVU93087310

Trust: 0.8

db:JVNDBid:JVNDB-2016-004107

Trust: 0.8

db:CNNVDid:CNNVD-201607-1061

Trust: 0.6

db:VULHUBid:VHN-94491

Trust: 0.1

sources: CERT/CC: VU#217871 // VULHUB: VHN-94491 // BID: 92199 // JVNDB: JVNDB-2016-004107 // PACKETSTORM: 138107 // CNNVD: CNNVD-201607-1061 // NVD: CVE-2016-5672

REFERENCES

url:https://blogs.intel.com/evangelists/2016/07/28/crosswalk-security-vulnerability/

Trust: 2.9

url:http://www.kb.cert.org/vuls/id/217871

Trust: 2.9

url:https://wwws.nightwatchcybersecurity.com/2016/07/29/advisory-intel-crosswalk-ssl-prompt-issue

Trust: 2.5

url:https://lists.crosswalk-project.org/pipermail/crosswalk-help/2016-july/002167.html

Trust: 1.8

url:https://crosswalk-project.org/jira/browse/xwalk-6986

Trust: 1.7

url:http://www.securityfocus.com/bid/92199

Trust: 1.1

url:http://www.securityfocus.com/archive/1/539051/100/0/threaded

Trust: 1.1

url:http://packetstormsecurity.com/files/138107/intel-crosswalk-project-man-in-the-middle.html

Trust: 1.1

url:https://wwws.nightwatchcybersecurity.com/2016/07/29/advisory-intel-crosswalk-ssl-prompt-issue/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5672

Trust: 0.9

url:http://jvn.jp/vu/jvnvu93087310/index.html

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5672

Trust: 0.8

url:https://crosswalk-project.org/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5672

Trust: 0.1

url:https://wwws.nightwatchcybersecurity.com/2016/07/29/advisory-intel-crosswalk-ssl-prompt-issue/]

Trust: 0.1

sources: CERT/CC: VU#217871 // VULHUB: VHN-94491 // BID: 92199 // JVNDB: JVNDB-2016-004107 // PACKETSTORM: 138107 // CNNVD: CNNVD-201607-1061 // NVD: CVE-2016-5672

CREDITS

Nightwatch Cybersecurity Research

Trust: 0.3

sources: BID: 92199

SOURCES

db:CERT/CCid:VU#217871
db:VULHUBid:VHN-94491
db:BIDid:92199
db:JVNDBid:JVNDB-2016-004107
db:PACKETSTORMid:138107
db:CNNVDid:CNNVD-201607-1061
db:NVDid:CVE-2016-5672

LAST UPDATE DATE

2025-04-13T23:17:53.076000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#217871date:2016-07-29T00:00:00
db:VULHUBid:VHN-94491date:2018-10-09T00:00:00
db:BIDid:92199date:2016-07-29T00:00:00
db:JVNDBid:JVNDB-2016-004107date:2016-08-05T00:00:00
db:CNNVDid:CNNVD-201607-1061date:2016-08-02T00:00:00
db:NVDid:CVE-2016-5672date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#217871date:2016-07-29T00:00:00
db:VULHUBid:VHN-94491date:2016-08-01T00:00:00
db:BIDid:92199date:2016-07-29T00:00:00
db:JVNDBid:JVNDB-2016-004107date:2016-08-02T00:00:00
db:PACKETSTORMid:138107date:2016-07-29T12:55:55
db:CNNVDid:CNNVD-201607-1061date:2016-07-31T00:00:00
db:NVDid:CVE-2016-5672date:2016-08-01T02:59:17.870