CVE-2025-46408
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-15

Last updated on: 2025-10-17

Assigner: MITRE

Description
An issue was discovered in the methods push.lite.avtech.com.AvtechLib.GetHttpsResponse and push.lite.avtech.com.Push_HttpService.getNewHttpClient in AVTECH EagleEyes 2.0.0. The methods set ALLOW_ALL_HOSTNAME_VERIFIER, bypassing domain validation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-15
Last Modified
2025-10-17
Generated
2026-05-07
AI Q&A
2025-09-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
avtech eagleeyes\(lite\) 2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-297 The product communicates with a host that provides a certificate, but the product does not properly ensure that the certificate is actually associated with that host.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in AVTECH EagleEyes 2.0.0 where the application disables proper hostname verification during HTTPS communication by using ALLOW_ALL_HOSTNAME_VERIFIER. This means the app accepts TLS certificates even if the certificate's hostname does not match the requested server's hostname, allowing attackers on the same network to perform man-in-the-middle attacks by intercepting or modifying the app's communications. [1]


How can this vulnerability impact me? :

The vulnerability can allow an attacker on the same network to intercept or modify sensitive data transmitted between the app and backend services by exploiting the disabled hostname verification. This can lead to exposure of confidential information, data tampering, or unauthorized access to communications. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by analyzing the application behavior or code to check if it uses SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which disables hostname verification. A practical approach is to use dynamic analysis tools such as Frida with a hooking script (e.g., hook.js) to intercept and modify the SDK_API_26 flag to false, emulating an older Android version and confirming if the vulnerable GetHttpsResponse() method is invoked. There are no specific network commands provided, but monitoring for man-in-the-middle attack indicators on the network could help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the use of SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER in the application code and enforcing strict hostname verification for all HTTPS connections. This can be done by validating the server's Common Name (CN) or Subject Alternative Name (SAN) against the requested hostname using HttpsURLConnection.getDefaultHostnameVerifier() or an equivalent strict verifier. Additionally, any legacy fallback logic that disables hostname checks on older Android versions should be removed or replaced with secure implementations to ensure consistent TLS validation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart