SSL Certificate Signed with the Publicly Known Cyberoam Key

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The SSL certificate for this service was signed by a CA whose private
key is public knowledge.

Description :

The X.509 certificate of the remote host was signed by a certificate
belonging to a Certificate Authority (CA) found in Cyberoam devices.
The private key corresponding to the CA was discovered and publicly
disclosed, meaning that the remote host's X.509 certificate cannot be
trusted.

See also :

https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt
http://www.nessus.org/u?6c356aec
http://www.nessus.org/u?956bd276
http://blog.cyberoam.com/2012/07/ssl-bridging-cyberoam-approach/

Solution :

Configure the device to use a device-specific CA certificate.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.5
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: General

Nessus Plugin ID: 61447 ()

Bugtraq ID: 54291

CVE ID: CVE-2012-3372