VYPR
Unrated severityNVD Advisory· Published Oct 20, 2014· Updated May 6, 2026

CVE-2014-7484

CVE-2014-7484

Description

The Coca-Cola FM Guatemala (aka com.enyetech.radio.coca_cola.fm_gu) application 2.0.41725 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Coca-Cola FM Guatemala for Android fails to verify SSL certificates, allowing man-in-the-middle attacks to spoof servers and steal sensitive data.

Vulnerability

The Coca-Cola FM Guatemala application (com.enyetech.radio.coca_cola.fm_gu) version 2.0.41725 for Android does not properly validate X.509 certificates presented by SSL servers [1]. This means the app accepts any certificate, including self-signed or forged ones, when establishing HTTPS connections. The official description [1] confirms this flaw applies to the specified version.

Exploitation

An attacker in a man-in-the-middle (MITM) position on the same network as the victim's Android device can present a crafted certificate to the application [1]. No prior authentication or user interaction beyond normal app use is required; the attacker simply intercepts the SSL handshake and supplies a fraudulent certificate, which the app accepts without verification [1].

Impact

By exploiting this flaw, an attacker can spoof legitimate servers and intercept or modify HTTPS traffic [1]. Sensitive information transmitted through the app, such as login credentials or personal data, can be disclosed. The impact is partially mitigated by what the application communicates, but credential theft or further compromise is possible [1].

Mitigation

The referenced CERT/CC note advises that users should avoid using affected applications if possible and access the same content via a web browser instead [1]. No specific patch or fixed version has been identified for this application. Users are recommended to uninstall the app until a security update is provided [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.