ID CVE-2012-3372
Summary The default configuration of Cyberoam UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Cyberoam_SSL_CA certificate in a list of trusted root certification authorities. NOTE: the vendor disputes the significance of this issue because the appliance "does not allow import or export of the foresaid private key.
References
Vulnerable Configurations
  • cpe:2.3:h:elitecore:cyberoam_unified_threat_management:*:*:*:*:*:*:*:*
    cpe:2.3:h:elitecore:cyberoam_unified_threat_management:*:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 11-04-2024 - 00:49)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
refmap via4
bugtraq 20120703 Cyberoam advisory
misc
Last major update 11-04-2024 - 00:49
Published 09-07-2012 - 10:20
Last modified 11-04-2024 - 00:49
Back to Top