When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2023-12-19T15:09:13.276Z

Updated: 2024-08-02T19:52:11.914Z

Reserved: 2023-09-25T07:14:20.358Z

Link: CVE-2023-43870

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-12-19T15:15:08.357

Modified: 2023-12-28T19:01:18.400

Link: CVE-2023-43870

cve-icon Redhat

No data.