The product does not validate, or incorrectly validates, a certificate.

Impact: Bypass Protection MechanismGain Privileges or Assume Identity
When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. The product might connect to a malicious host while believing it is a trusted host, or the product might be deceived into accepting spoofed data that appears to originate from a trusted host.
c
// certificate looks good, host can be trusted*
c
// do secret things* }
c
//do stuff*
c
// got a certificate, do secret things*
c
// got certificate, host can be trusted*
c