Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34810 | Nintendo Wii U OS 5.5.5 allows man-in-the-middle attackers to forge SSL certificates as though they came from a Root CA, because there is a secondary verification mechanism that only checks whether a CA is known and ignores the CA details and signature (and because * is accepted as a Common Name). |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nintendo
Nintendo wii U |
|
| CPEs | cpe:2.3:o:nintendo:wii_u:5.5.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Nintendo
Nintendo wii U |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:53:25.411Z
Reserved: 2024-05-03T00:00:00.000Z
Link: CVE-2024-34454
Updated: 2024-08-02T02:51:11.532Z
Status : Deferred
Published: 2024-05-26T22:15:08.650
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-34454
No data.
OpenCVE Enrichment
No data.
EUVD