Описание
Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.
Ссылки
- Third Party AdvisoryUS Government Resource
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party AdvisoryUS Government Resource
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:barracuda:web_filter:7.0:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_filter:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_filter:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_filter:8.0:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_filter:8.0.002:*:*:*:*:*:*:*
cpe:2.3:a:barracuda:web_filter:8.0.003:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.00618
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-18
Связанные уязвимости
github
больше 3 лет назад
Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.
EPSS
Процентиль: 69%
0.00618
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-18