The default configuration of Cyberoam UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Cyberoam_SSL_CA certificate in a list of trusted root certification authorities. NOTE: the vendor disputes the significance of this issue because the appliance "does not allow import or export of the foresaid private key.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 27 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-01-27T21:07:51.463Z

Reserved: 2012-06-14T00:00:00.000Z

Link: CVE-2012-3372

cve-icon Vulnrichment

Updated: 2024-08-06T20:05:12.354Z

cve-icon NVD

Status : Deferred

Published: 2012-07-09T10:20:44.417

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-3372

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.