Attackers can exploit these issues to crash the affected application or spoof a valid server and conduct man-in-the-middle attacks. Successful exploits will cause victims to accept the certificates assuming they are from a legitimate site.
Vendor Status:
Vendor as issued an updated vulnerability.