PT-2026-41395 · Maven · Com.Oviva.Telematik:Epa4All-Client
Published
2026-05-15
·
Updated
2026-05-15
·
CVE-2026-45574
CVSS v3.1
8.1
High
| Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Impact
An attacker on the network path between the ePA service and the Konnektor can present any TLS certificate (self-signed, expired, wrong CN) and intercept all SOAP traffic. This includes patient identifiers (KVNR), SMC-B card operations (authentication, signing),
document content, and credential exchanges.
Patches
Workarounds
Use the library directly instead of the REST wrapper.
Resources
- MS-OVIVA-EPA4ALL-771a78
Credits
- Dr. rer. nat. Simon Weber
- Dipl.-Inf. Volker Schönefeld
- Chiara Fliegner
Fix
Improper Certificate Validation
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Com.Oviva.Telematik:Epa4All-Client