| ID |
CVE-2012-4948
|
| Sažetak |
The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities. |
| Reference |
|
| CVSS |
| Base: | 5.3 |
| Impact: | 7.8 |
| Exploitability: | 3.2 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| ADJACENT_NETWORK |
HIGH |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
PARTIAL |
NONE |
|
| CVSS vektor |
AV:A/AC:H/Au:N/C:C/I:P/A:N |
| Zadnje važnije ažuriranje |
07-12-2016 - 18:14 |
| Objavljeno |
14-11-2012 - 12:30 |