<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45574 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45574/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 18:29:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45574/feed.xml" rel="self" type="application/rss+xml"/><item><title>epa4all-client Library Vulnerable to TLS Certificate Validation Issue (CVE-2026-45574)</title><link>https://feed.craftedsignal.io/briefs/2026-05-epa4all-client-tls-validation/</link><pubDate>Fri, 15 May 2026 18:29:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-epa4all-client-tls-validation/</guid><description>The epa4all-client library before version 1.2.2 is vulnerable to a TLS certificate validation issue, allowing a man-in-the-middle attacker to intercept SOAP traffic and sensitive patient data by presenting a malicious TLS certificate.</description><content:encoded><![CDATA[<p>The <code>epa4all-client</code> library, used for electronic patient record (ePA) interactions, contains a flaw that disables TLS certificate validation in production environments. This vulnerability, present in versions prior to 1.2.2, allows an attacker positioned on the network path between the ePA service and the Konnektor to intercept all SOAP traffic. This includes sensitive information such as patient identifiers (KVNR), SMC-B card operations (authentication, signing), document content, and credential exchanges. The vulnerability is identified as CVE-2026-45574 and was reported by Machine Spirits. Exploitation of this flaw allows for significant data breaches and unauthorized access to patient information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker positions themselves on the network path between the ePA client (using the vulnerable library) and the ePA service/Konnektor.</li>
<li>The ePA client attempts to establish a TLS connection to the ePA service.</li>
<li>The attacker intercepts the TLS handshake and presents a malicious TLS certificate (self-signed, expired, or with a wrong CN).</li>
<li>Due to the disabled TLS certificate validation in the vulnerable <code>epa4all-client</code> library, the client accepts the malicious certificate without proper verification.</li>
<li>A secure TLS connection is established between the ePA client and the attacker, who is impersonating the legitimate ePA service.</li>
<li>The ePA client sends SOAP requests containing sensitive data (patient identifiers, SMC-B card operations, document content, and credentials) over the TLS connection.</li>
<li>The attacker intercepts and decrypts the SOAP traffic, gaining access to the sensitive data.</li>
<li>The attacker can then use the stolen data for malicious purposes, such as identity theft, fraud, or unauthorized access to patient records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to intercept and steal sensitive patient data transmitted between the ePA client and the ePA service. This includes patient identifiers (KVNR), SMC-B card operations (authentication, signing), document content, and credential exchanges. A successful attack could lead to large-scale data breaches, identity theft, and unauthorized access to confidential patient records, impacting potentially thousands of patients and healthcare providers using the vulnerable <code>epa4all-client</code> library.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>epa4all-client</code> library to version 1.2.2 or later to remediate the TLS certificate validation vulnerability (CVE-2026-45574).</li>
<li>As a workaround, use the library directly instead of the REST wrapper as suggested in the advisory.</li>
<li>Monitor network traffic for unexpected TLS connections originating from applications using the <code>epa4all-client</code> library, using the rules below, especially if connections use non-standard certificates.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>tls</category><category>certificate-validation</category><category>mitm</category><category>credential-access</category><category>cve-2026-45574</category></item></channel></rss>