VYPR
Unrated severityNVD Advisory· Published Sep 22, 2014· Updated May 6, 2026

CVE-2014-6014

CVE-2014-6014

Description

The Conquest Of Fantasia (aka air.com.ingen.studios.cof.sg) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An Android app from Conquest Of Fantasia fails to validate SSL certificates, enabling man-in-the-middle attacks to intercept sensitive data.

Vulnerability

The Conquest Of Fantasia application (package air.com.ingen.studios.cof.sg) version 1.0.1 for Android fails to properly verify X.509 certificates presented by HTTPS servers. This means the app does not validate whether the SSL certificate chain originates from a trusted root certificate authority, breaking the trust model of HTTPS. The vulnerable code path is reachable whenever the app makes any HTTPS connection; no special configuration is required by the user. [1]

Exploitation

An attacker must be able to perform a man-in-the-middle (MITM) attack on the network between the Android device and the target server. This is typically achieved by being on the same Wi-Fi network, or by compromising a network router or proxy. The attacker presents a crafted certificate (e.g., self-signed or from a rogue CA) during the TLS handshake. Because the app does not verify the certificate, it accepts the connection and proceeds to send data over HTTPS. [1]

Impact

A successful MITM attacker can intercept all HTTPS traffic between the app and its backend servers. This may include credentials, personal information, or other sensitive data transmitted by the app. The attacker can also read or modify the data in transit. The exact compromise depends on what the app exchanges over HTTPS; potential impacts include credential theft and, in some scenarios, arbitrary code execution if the attacker injects malicious content that the app processes. [1]

Mitigation

No fix has been released by the vendor for Conquest Of Fantasia 1.0.1. The CERT/CC recommends avoiding the use of vulnerable Android applications for sensitive transactions; users can access the same content via a web browser instead. As of the publication date (2014-09-22), this application was not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. [1]

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.