Vulnerability CVE-2012-4948


Published: 2012-11-14

Description:
The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.

CVSS2 => (AV:A/AC:H/Au:N/C:C/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.3/10
7.8/10
3.2/10
Exploit range
Attack complexity
Authentication
Adjacent network
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Partial
None
Affected software
Fortinet -> Fortigate-5001a-sw 
Fortinet -> Fortigate-1000c 
Fortinet -> Fortigate-5001b 
Fortinet -> Fortigate-100d 
Fortinet -> Fortigate-5020 
Fortinet -> Fortigate-110c 
Fortinet -> Fortigate-5060 
Fortinet -> Fortigate-1240b 
Fortinet -> Fortigate-50b 
Fortinet -> Fortigate-200b 
Fortinet -> Fortigate-5101c 
Fortinet -> Fortigate-20c 
Fortinet -> Fortigate-5140b 
Fortinet -> Fortigate-300c 
Fortinet -> Fortigate-600c 
Fortinet -> Fortigate-3040b 
Fortinet -> Fortigate-60c 
Fortinet -> Fortigate-310b 
Fortinet -> Fortigate-620b 
Fortinet -> Fortigate-311b 
Fortinet -> Fortigate-800c 
Fortinet -> Fortigate-3140b 
Fortinet -> Fortigate-80c 
Fortinet -> Fortigate-3240c 
Fortinet -> Fortigate-voice-80c 
Fortinet -> Fortigate-3810a 
Fortinet -> Fortigaterugged-100c 
Fortinet -> Fortigate-3950b 
Fortinet -> Fortigate-40c 

 References:
http://www.kb.cert.org/vuls/id/111708
http://www.securityfocus.com/bid/56382

Copyright 2024, cxsecurity.com

 

Back to Top