CVE-2014-6014
Description
The Conquest Of Fantasia (aka air.com.ingen.studios.cof.sg) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An Android app from Conquest Of Fantasia fails to validate SSL certificates, enabling man-in-the-middle attacks to intercept sensitive data.
Vulnerability
The Conquest Of Fantasia application (package air.com.ingen.studios.cof.sg) version 1.0.1 for Android fails to properly verify X.509 certificates presented by HTTPS servers. This means the app does not validate whether the SSL certificate chain originates from a trusted root certificate authority, breaking the trust model of HTTPS. The vulnerable code path is reachable whenever the app makes any HTTPS connection; no special configuration is required by the user. [1]
Exploitation
An attacker must be able to perform a man-in-the-middle (MITM) attack on the network between the Android device and the target server. This is typically achieved by being on the same Wi-Fi network, or by compromising a network router or proxy. The attacker presents a crafted certificate (e.g., self-signed or from a rogue CA) during the TLS handshake. Because the app does not verify the certificate, it accepts the connection and proceeds to send data over HTTPS. [1]
Impact
A successful MITM attacker can intercept all HTTPS traffic between the app and its backend servers. This may include credentials, personal information, or other sensitive data transmitted by the app. The attacker can also read or modify the data in transit. The exact compromise depends on what the app exchanges over HTTPS; potential impacts include credential theft and, in some scenarios, arbitrary code execution if the attacker injects malicious content that the app processes. [1]
Mitigation
No fix has been released by the vendor for Conquest Of Fantasia 1.0.1. The CERT/CC recommends avoiding the use of vulnerable Android applications for sensitive transactions; users can access the same content via a web browser instead. As of the publication date (2014-09-22), this application was not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. [1]
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:ingen-studios:conquest_of_fantasia:1.0.1:*:*:*:*:android:*:*
- Range: = 1.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.kb.cert.org/vuls/id/582497nvdThird Party AdvisoryUS Government Resource
- www.kb.cert.org/vuls/id/821065nvdUS Government Resource
- docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/editnvd
News mentions
0No linked articles in our index yet.