This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The remote Windows host is affected by a man-in-the-middle
The remote Windows host is affected by a man-in-the-middle (MitM)
vulnerability due to the installation of a non-authorized root CA
certificate into the Windows trusted system certificate store. The
private keys for many of these root CAs are publicly known.
Furthermore, websites that use specially crafted self-signed
certificates will be reported as trusted to the user. Individual
Firefox and Thunderbird profiles may also contain the compromised root
A MitM attacker can exploit this vulnerability to read and/or modify
communications encrypted via HTTPS without the user's knowledge.
See also :
Uninstall the eDellRoot and DSDTestProvider root CA certificates per
the vendor knowledge base article.
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 5.5
Public Exploit Available : true
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now