CVE-2014-5960
Description
The BundesArztsuche (aka de.kbv.bas) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The BundesArztsuche Android app (v1.0.1) fails to verify X.509 certificates, enabling MITM attacks to spoof servers and steal sensitive data.
Vulnerability
The BundesArztsuche (de.kbv.bas) application version 1.0.1 for Android does not properly validate X.509 certificates presented by SSL/TLS servers. This means that when the app establishes an HTTPS connection, it does not verify that the certificate chain is signed by a trusted root certificate authority. The flaw affects the specific version 1.0.1, as described in the official CVE summary [1].
Exploitation
An attacker positioned on the same network as the Android device (e.g., a malicious Wi-Fi hotspot or through ARP spoofing) can perform a man-in-the-middle attack. The attacker presents a crafted certificate to the application, which the app accepts without validation. This allows the attacker to intercept and potentially modify HTTPS traffic between the app and the intended server. No additional authentication or user interaction beyond launching the app is required [1].
Impact
Successful exploitation enables the attacker to read (information disclosure) and possibly modify sensitive data that the BundesArztsuche app sends or receives. The exact impact depends on the data handled by the app, but could include exposure of personal health information or other private user data. The attacker gains the ability to spoof the legitimate server and obtain sensitive information [1].
Mitigation
The CERT/CC advisory recommends not using affected applications when equivalent functionality is available via a web browser, as browser-based access typically uses proper SSL validation by the operating system. As of the publication date, no official patch or updated version of the BundesArztsuche app has been identified in the available references to address the certificate validation flaw [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:kbv:federal_doctors:1.0.1:*:*:*:*:android:*:*
- Range: <= 1.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.kb.cert.org/vuls/id/582497nvdThird Party AdvisoryUS Government Resource
- www.kb.cert.org/vuls/id/557681nvdUS Government Resource
- docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/editnvd
News mentions
0No linked articles in our index yet.