First published: Mon May 25 2015(Updated: )
Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda Web Filter | =7.0 | |
Barracuda Web Filter | =7.0.1 | |
Barracuda Web Filter | =7.1.0 | |
Barracuda Web Filter | =8.0 | |
Barracuda Web Filter | =8.0.002 | |
Barracuda Web Filter | =8.0.003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0962 is considered to have a medium severity due to its potential for man-in-the-middle attacks.
To fix CVE-2015-0962, upgrade to Barracuda Web Filter version 8.1.0.005 or later.
CVE-2015-0962 affects Barracuda Web Filter versions 7.x and 8.x prior to 8.1.0.005.
CVE-2015-0962 enables remote attackers to perform man-in-the-middle attacks on SSL sessions.
Yes, SSL Inspection being enabled on Barracuda Web Filter creates the vulnerability in CVE-2015-0962.