First published: Mon Jul 09 2012(Updated: )
** DISPUTED ** The default configuration of Cyberoam UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Cyberoam_SSL_CA certificate in a list of trusted root certification authorities. NOTE: the vendor disputes the significance of this issue because the appliance "does not allow import or export of the foresaid private key."
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Elitecore Cyberoam Unified Threat Management | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3372 is considered to have a medium severity due to the potential for man-in-the-middle attacks.
The risks include unauthorized interception and manipulation of SSL traffic due to the shared certificate and private key.
CVE-2012-3372 affects Cyberoam UTM appliances by allowing attackers easier access to spoof SSL servers.
To mitigate CVE-2012-3372, update the Cyberoam UTM configuration to use unique certificates for each installation.
Yes, CVE-2012-3372 remains a concern for users who have not updated their configurations to prevent certificate sharing.