VYPR
Unrated severityNVD Advisory· Published Oct 21, 2014· Updated May 6, 2026

CVE-2014-7667

CVE-2014-7667

Description

The Coca-Cola FM Honduras (aka com.enyetech.radio.coca_cola.fm_hn) application 2.0.41725 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Coca-Cola FM Honduras Android app fails to validate SSL certificates, enabling man-in-the-middle attacks to steal sensitive data.

Vulnerability

The Coca-Cola FM Honduras (com.enyetech.radio.coca_cola.fm_hn) application version 2.0.41725 for Android does not verify X.509 certificates from SSL servers. This means the app accepts any certificate presented during an HTTPS connection without validating its chain of trust against a trusted root certificate authority. The vulnerability exists in the network communication code path of the application when it connects to its backend servers.

Exploitation

An attacker with network access (e.g., on the same Wi-Fi network as the victim) can perform a man-in-the-middle (MITM) attack. By presenting a crafted certificate (e.g., self-signed or issued by an untrusted CA) to the app, the attacker can intercept the HTTPS traffic. The attacker does not need prior authentication to the app; they only need to be positioned to intercept network packets between the Android device and the server [1].

Impact

A successful attacker can read (disclose) and potentially modify network traffic that should have been protected by HTTPS. This can lead to credential theft, exposure of personal or sensitive information, or arbitrary code execution depending on the nature of the intercepted data [1]. The attacker gains the ability to spoof the legitimate server and obtain any sensitive information transmitted by the app.

Mitigation

The vendor (Enyetech / Coca-Cola) has not released a patched version as of the publication date. The CERT/CC recommends not using the affected application and instead accessing content via a web browser, which typically implements proper SSL validation [1]. Users should uninstall the app or seek an alternative official client that correctly validates certificates.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • cpe:2.3:a:enyetech:coca-cola_fm_honduras:2.0.41725:*:*:*:*:android:*:*+ 1 more
    • cpe:2.3:a:enyetech:coca-cola_fm_honduras:2.0.41725:*:*:*:*:android:*:*
    • (no CPE)range: =2.0.41725

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.