Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2026-37 |
|
Tue, 05 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gnu:wget2:*:*:*:*:*:*:*:* |
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu wget2 |
|
| Vendors & Products |
Gnu
Gnu wget2 |
Wed, 29 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wget2 accepts a server certificate with incorrect Key Usage (KU) or Extended Key Usage (EKU). If the attackers compromise a certificate (with the associated private key) issued for a different purpose, they may be able to reuse it for TLS server authentication. | |
| Title | wget2 Improper Certificate Validation | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-04-30T15:22:05.205Z
Reserved: 2026-02-03T20:13:53.718Z
Link: CVE-2026-1858
Updated: 2026-04-30T13:17:35.751Z
Status : Analyzed
Published: 2026-04-29T21:16:20.513
Modified: 2026-05-05T02:47:29.463
Link: CVE-2026-1858
No data.
OpenCVE Enrichment
Updated: 2026-04-30T03:45:06Z