First published: Tue Nov 02 2010(Updated: )
Red Hat / Dogtag Certificate System's Certificate Authority can be asked to decrypt one-time PIN used in the SCEP (Simple Certificate Enrollment Protocol) protocol requests. This feature is intended to be used by Registration Authorities that act as proxies between CA users (e.g. network devices enrolling using SCEP protocol) and CA itself. However, Red Hat Certificate System lacked proper authentication mechanisms to ensure such decryption requests are only replied if sent form the configured Registration Authority. An attacker able to sniff SCEP request of the network could use this flaw to request decryption of the sniffed request and obtain one-time PIN. Red Hat Certificate System updates add proper authentication, only configured authenticated Registration Authorities can request SCEP one-time PIN decryption.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Certificate System | =7.3 | |
Red Hat Certificate System | =8 | |
Dogtag Certificate System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3868 is classified as a moderate severity vulnerability.
To mitigate CVE-2010-3868, users should upgrade to the patched versions of the Red Hat Certificate System or Dogtag Certificate System according to Red Hat's security advisories.
CVE-2010-3868 affects Red Hat Certificate System versions 7.3 and 8, as well as Dogtag Certificate System.
CVE-2010-3868 allows an attacker to decrypt one-time PINs used in SCEP protocol requests, potentially compromising secure communications.
CVE-2010-3868 is not a zero-day vulnerability as it has been identified and documented, with fixes available.