First published: Mon May 25 2015(Updated: )
Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Barracuda Web Filter | =7.0 | |
Barracuda Web Filter | =7.0.1 | |
Barracuda Web Filter | =7.1.0 | |
Barracuda Web Filter | =8.0 | |
Barracuda Web Filter | =8.0.002 | |
Barracuda Web Filter | =8.0.003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.