GHSA-5hhf-xmfx-4vvrHighCVSS 8.1
epa4all-client: TLS Certificate Validation Disabled in Production
🔗 CVE IDs covered (1)
📋 Description
### Impact
An attacker on the network path between the ePA service and the Konnektor can present any TLS certificate (self-signed, expired, wrong CN) and intercept all SOAP traffic. This includes patient identifiers (KVNR), SMC-B card operations (authentication, signing),
document content, and credential exchanges.
### Patches
[#36](https://github.com/oviva-ag/epa4all-client/pull/36)
### Workarounds
Use the library directly instead of the REST wrapper.
### Resources
- MS-OVIVA-EPA4ALL-771a78
### Credits
[Machine Spirits](https://machinespirits.com/) ([contact@machinespirits.de](mailto:contact@machinespirits.de))
- Dr. rer. nat. Simon Weber
- Dipl.-Inf. Volker Schönefeld
- Chiara Fliegner
🎯 Affected products1
- maven/com.oviva.telematik:epa4all-client:< 1.2.2
🔗 References (5)
- https://github.com/oviva-ag/epa4all-client/security/advisories/GHSA-5hhf-xmfx-4vvr
- https://github.com/oviva-ag/epa4all-client/pull/36
- https://github.com/oviva-ag/epa4all-client/commit/9111d6fbb939007036a7f74b2a93bb278cb5af32
- https://github.com/oviva-ag/epa4all-client/releases/tag/v1.2.2
- https://github.com/advisories/GHSA-5hhf-xmfx-4vvr