First published: Fri Sep 20 2013(Updated: )
The KVM subsystem in Cisco Unified Computing System (UCS) relies on a hardcoded X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers, and read keyboard and mouse events, by leveraging knowledge of this certificate's private key, aka Bug ID CSCte90327.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Computing System software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4072 is considered a high-severity vulnerability due to its potential for man-in-the-middle attacks.
To mitigate CVE-2012-4072, update the Cisco Unified Computing System software to the latest version provided by Cisco.
CVE-2012-4072 allows attackers to execute man-in-the-middle attacks, enabling them to spoof SSL servers and capture keyboard and mouse events.
If you are using a Cisco Unified Computing System that relies on the KVM subsystem, it is likely affected by CVE-2012-4072.
All versions of Cisco Unified Computing System software that utilize the hardcoded X.509 certificate are vulnerable to CVE-2012-4072.