A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.
History

Fri, 13 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.
Title Insufficient Certificate Validation in Multiple Mobile Applications Allows Man in the Middle Interception
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2026-02-13T00:22:27.459Z

Updated: 2026-02-13T13:17:20.477Z

Reserved: 2025-08-20T22:29:42.732Z

Link: CVE-2025-9293

cve-icon Vulnrichment

Updated: 2026-02-13T13:17:16.362Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-13T02:16:46.523

Modified: 2026-02-13T14:23:48.007

Link: CVE-2025-9293

cve-icon Redhat

No data.