PT-2026-41395 · Maven · Com.Oviva.Telematik:Epa4All-Client

Published

2026-05-15

·

Updated

2026-05-15

·

CVE-2026-45574

CVSS v3.1

8.1

High

VectorAV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Impact

An attacker on the network path between the ePA service and the Konnektor can present any TLS certificate (self-signed, expired, wrong CN) and intercept all SOAP traffic. This includes patient identifiers (KVNR), SMC-B card operations (authentication, signing), document content, and credential exchanges.

Patches

Workarounds

Use the library directly instead of the REST wrapper.

Resources

  • MS-OVIVA-EPA4ALL-771a78

Credits

  • Dr. rer. nat. Simon Weber
  • Dipl.-Inf. Volker Schönefeld
  • Chiara Fliegner

Fix

Improper Certificate Validation

Weakness Enumeration

Related Identifiers

CVE-2026-45574
GHSA-5HHF-XMFX-4VVR

Affected Products

Com.Oviva.Telematik:Epa4All-Client