{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T21:17:37.604","vulnerabilities":[{"cve":{"id":"CVE-2017-3182","sourceIdentifier":"cret@cert.org","published":"2018-07-24T15:29:00.437","lastModified":"2024-11-21T03:24:58.970","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"On the iOS platform, the ThreatMetrix SDK versions prior to 3.2 fail to validate SSL certificates provided by HTTPS connections, which may allow an attacker to perform a man-in-the-middle (MITM) attack. ThreatMetrix is a security library for mobile applications, which aims to provide fraud prevention and device identity capabilities. The ThreatMetrix SDK versions prior to 3.2 do not validate SSL certificates on the iOS platform. An affected application will communicate with https://h-sdk.online-metrix.net, regardless of whether the connection is secure or not. An attacker on the same network as or upstream from the iOS device may be able to view or modify ThreatMetrix network traffic that should have been protected by HTTPS."},{"lang":"es","value":"En la plataforma iOS, ThreatMetrix SDK en versiones anteriores a la 3.2 no valida los certificados SSL proporcionados por las conexiones HTTPS, lo que podría permitir que un atacante realice un ataque Man-in-the-Middle (MitM). ThreatMetrix es una biblioteca de seguridad para aplicaciones móviles que proporciona capacidades de prevención de fraude e identificación de dispositivos. Las versiones anteriores a la 3.2 de ThreatMetrix SDK no validan los certificados SSL en la plataforma iOS. Una aplicación afectada se comunicará con https://h-sdk.online-metrix.net, independientemente de que la conexión sea segura o no. Un atacante en la misma red o en upstream desde el dispositivo iOS podría ser capaz de ver o modificar tráfico de red ThreatMetrix que debería haber estado protegido por HTTPS."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:P/I:P/A:N","baseScore":4.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":5.5,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-295"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:threatmetrix:threatmetrix_sdk:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"3.2","matchCriteriaId":"7E3D6610-8464-4109-B4C9-63BA43B3F7D2"}]}]}],"references":[{"url":"https://www.kb.cert.org/vuls/id/767208","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.securityfocus.com/bid/95360","source":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.kb.cert.org/vuls/id/767208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.securityfocus.com/bid/95360","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}