First published: Wed Nov 14 2012(Updated: )
The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortigate-1000c | ||
Fortinet Fortigate-100d | ||
Fortinet Fortigate-110c | ||
Fortinet Fortigate-1240b | ||
Fortinet Fortigate-200b | ||
Fortinet Fortigate-20c | ||
Fortinet Fortigate-300c | ||
Fortinet Fortigate | ||
Fortinet Fortigate-310b | ||
Fortinet Fortigate-311b | ||
Fortinet Fortigate-3140b | ||
Fortinet Fortigate-3240c | ||
Fortinet Fortigate-3810a | ||
Fortinet Fortigate | ||
Fortinet Fortigate-40c | ||
Fortinet Fortigate-5001A | ||
Fortinet Fortigate-5001b | ||
Fortinet Fortigate | ||
Fortinet Fortigate | ||
Fortinet Fortigate | ||
Fortinet Fortigate-5101C | ||
Fortinet Fortigate-5140b | ||
Fortinet Fortigate | ||
Fortinet Fortigate-60c | ||
Fortinet Fortigate-620b | ||
Fortinet Fortigate-800c | ||
Fortinet Fortigate-voice-80c | ||
Fortinet Fortigate-voice-80c | ||
Fortinet FortiGate Rugged-100C |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4948 is considered to be a medium severity vulnerability.
To fix CVE-2012-4948, change the default certificate and private key to unique values for your Fortinet Fortigate appliance.
CVE-2012-4948 affects a range of Fortinet Fortigate models including Fortigate-1000C, Fortigate-100D, and many others.
CVE-2012-4948 enables man-in-the-middle attacks, allowing attackers to spoof SSL servers.
Yes, CVE-2012-4948 has been referenced in various exploit discussions, highlighting its potential for abuse in man-in-the-middle scenarios.