When installing the Net2 software a root certificate is installed into the trusted store. A potential hacker could access the installer batch file or reverse engineer the source code to gain access to the root certificate password. Using the root certificate and password they could then create their own certificates to emulate another site. Then by establishing a proxy service to emulate the site they could monitor traffic passed between the end user and the site allowing access to the data content.
History

Wed, 27 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-NL

Published: 2023-12-19T15:09:13.276Z

Updated: 2024-11-27T20:03:30.624Z

Reserved: 2023-09-25T07:14:20.358Z

Link: CVE-2023-43870

cve-icon Vulnrichment

Updated: 2024-08-02T19:52:11.914Z

cve-icon NVD

Status : Modified

Published: 2023-12-19T15:15:08.357

Modified: 2024-11-21T08:24:55.823

Link: CVE-2023-43870

cve-icon Redhat

No data.