SSL Certificate Signed with the Publicly Known Cyberoam Key

medium Nessus Plugin ID 61447
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The SSL certificate for this service was signed by a CA whose private key is public knowledge.

Description

The X.509 certificate of the remote host was signed by a certificate belonging to a Certificate Authority (CA) found in Cyberoam devices. The private key corresponding to the CA was discovered and publicly disclosed, meaning that the remote host's X.509 certificate cannot be trusted.

Solution

Configure the device to use a device-specific CA certificate.

See Also

https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt

http://www.nessus.org/u?ebc9c721

http://www.nessus.org/u?956bd276

http://blog.cyberoam.com/2012/07/ssl-bridging-cyberoam-approach/

Plugin Details

Severity: Medium

ID: 61447

File Name: ssl_cyberoam.nasl

Version: 1.7

Type: remote

Family: General

Published: 8/7/2012

Updated: 10/26/2020

Dependencies: ssl_supported_versions.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/h:elitecore:cyberoam_unified_threat_management

Required KB Items: SSL/Supported

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/30/2012

Reference Information

CVE: CVE-2012-3372

BID: 54291