CVE-2012-3372 Vulnerability Details

  /     /     /  

CVE-2012-3372 Metadata Quick Info

CVE Published: 09/07/2012 | CVE Updated: 16/09/2024 | CVE Year: 2012
Source: redhat | Vendor: n/a | Product: n/a
Status : PUBLISHED

CVE-2012-3372 Description

The default configuration of Cyberoam UTM appliances uses the same Certification Authority certificate and same private key across different customers\' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Cyberoam_SSL_CA certificate in a list of trusted root certification authorities. NOTE: the vendor disputes the significance of this issue because the appliance "does not allow import or export of the foresaid private key.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: n/a
Source: n/a

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).