Search for vulnerabilities
Vulnerability details: VCID-q6ev-xg56-aaad
Vulnerability ID VCID-q6ev-xg56-aaad
Aliases CVE-2023-34410
Summary An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34410.json
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00066 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00066 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00107 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.0011 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00254 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
epss 0.00531 https://api.first.org/data/v1/epss?cve=CVE-2023-34410
cvssv3.1 5.3 https://codereview.qt-project.org/c/qt/qtbase/+/477560
ssvc Track https://codereview.qt-project.org/c/qt/qtbase/+/477560
cvssv3.1 5.3 https://codereview.qt-project.org/c/qt/qtbase/+/480002
ssvc Track https://codereview.qt-project.org/c/qt/qtbase/+/480002
cvssv3.1 6.2 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.3 https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
ssvc Track https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-34410
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-34410
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34410.json
https://api.first.org/data/v1/epss?cve=CVE-2023-34410
https://codereview.qt-project.org/c/qt/qtbase/+/477560
https://codereview.qt-project.org/c/qt/qtbase/+/480002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34410
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
1037209 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037209
2212747 https://bugzilla.redhat.com/show_bug.cgi?id=2212747
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
CVE-2023-34410 https://nvd.nist.gov/vuln/detail/CVE-2023-34410
RHSA-2023:6369 https://access.redhat.com/errata/RHSA-2023:6369
RHSA-2023:6967 https://access.redhat.com/errata/RHSA-2023:6967
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34410.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://codereview.qt-project.org/c/qt/qtbase/+/477560
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:58:49Z/ Found at https://codereview.qt-project.org/c/qt/qtbase/+/477560
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://codereview.qt-project.org/c/qt/qtbase/+/480002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:58:49Z/ Found at https://codereview.qt-project.org/c/qt/qtbase/+/480002
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:58:49Z/ Found at https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T16:58:49Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-34410
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-34410
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.27313
EPSS Score 0.00061
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.