SSL Certificate Signed with the Publicly Known Cyberoam Key

medium Nessus Plugin ID 61447
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 3.7

Synopsis

The SSL certificate for this service was signed by a CA whose private key is public knowledge.

Description

The X.509 certificate of the remote host was signed by a certificate belonging to a Certificate Authority (CA) found in Cyberoam devices. The private key corresponding to the CA was discovered and publicly disclosed, meaning that the remote host's X.509 certificate cannot be trusted.

Solution

Configure the device to use a device-specific CA certificate.

See Also

https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt

http://www.nessus.org/u?ebc9c721

http://www.nessus.org/u?956bd276

http://blog.cyberoam.com/2012/07/ssl-bridging-cyberoam-approach/

Plugin Details

Severity: Medium

ID: 61447

File Name: ssl_cyberoam.nasl

Version: 1.7

Type: remote

Family: General

Published: 8/7/2012

Updated: 10/26/2020

Dependencies: ssl_supported_versions.nasl

Risk Information

Risk Factor: Medium

VPR Score: 3.7

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/h:elitecore:cyberoam_unified_threat_management

Required KB Items: SSL/Supported

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/30/2012

Reference Information

CVE: CVE-2012-3372

BID: 54291