First published: Tue Nov 02 2010(Updated: )
Red Hat / Dogtag Certificate System did not prevent re-use of the one-time PIN used in the SCEP (Simple Certificate Enrollment Protocol) protocol enrollment requests. The check was done to ensure that PIN is valid, but the PIN was never removed from the list of valid PINs once it was used. An attacker possessing a valid SCEP enrollment one-time PIN could use it to generate an unlimited number of certificates.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Certificate System | =7.3 | |
Red Hat Certificate System | =8 | |
Dogtag Certificate System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3869 is considered a high severity vulnerability due to its potential to allow unauthorized access through the reuse of one-time PINs.
To address CVE-2010-3869, ensure that the one-time PINs are removed from the list of valid PINs immediately after use.
CVE-2010-3869 affects Red Hat Certificate System versions 7.3 and 8, as well as Dogtag Certificate System.
CVE-2010-3869 is caused by the failure to invalidate one-time PINs after their initial use in the SCEP protocol.
The potential impacts of CVE-2010-3869 include unauthorized access to sensitive information due to the re-use of one-time PINs.