CVE-2015-0961

Barracuda Web Filter before 8.1.0.005, when SSL Inspection is enabled, does not verify X.509 certificates from upstream SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:barracuda:web_filter:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/534407 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/534407 - Third Party Advisory, US Government Resource
References () https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/ - Vendor Advisory () https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/ - Vendor Advisory
References () https://techlib.barracuda.com/BWF/UpdateSSLCerts - Vendor Advisory () https://techlib.barracuda.com/BWF/UpdateSSLCerts - Vendor Advisory
References () https://www.barracuda.com/support/techalerts - Vendor Advisory () https://www.barracuda.com/support/techalerts - Vendor Advisory

Information

Published : 2015-05-25 22:59

Updated : 2024-11-21 02:24


NVD link : CVE-2015-0961

Mitre link : CVE-2015-0961

CVE.ORG link : CVE-2015-0961


JSON object : View

Products Affected

barracuda

  • web_filter