The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.
References
Link | Resource |
---|---|
http://osvdb.org/87048 | |
http://www.kb.cert.org/vuls/id/111708 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/56382 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2012-11-14 12:30
Updated : 2024-02-28 12:00
NVD link : CVE-2012-4948
Mitre link : CVE-2012-4948
CVE.ORG link : CVE-2012-4948
JSON object : View
Products Affected
fortinet
- fortigate-60c
- fortigate-1240b
- fortigate-5140b
- fortigate-620b
- fortigate-800c
- fortigate-5020
- fortigate-311b
- fortigate-3950b
- fortigate-300c
- fortigate-600c
- fortigate-200b
- fortigate-100d
- fortigate-1000c
- fortigate-5101c
- fortigate-voice-80c
- fortigate-80c
- fortigate-3040b
- fortigaterugged-100c
- fortigate-110c
- fortigate-310b
- fortigate-5001a-sw
- fortigate-20c
- fortigate-5060
- fortigate-3140b
- fortigate-5001b
- fortigate-50b
- fortigate-40c
- fortigate-3810a
- fortigate-3240c
CWE
CWE-295
Improper Certificate Validation