Логотип exploitDog
bind:CVE-2012-4948
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-4948

Количество 2

Количество 2

nvd логотип

CVE-2012-4948

около 13 лет назад

The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.

CVSS2: 5.3
EPSS: Низкий
github логотип

GHSA-p5m6-f3fp-3v88

больше 3 лет назад

The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-4948

The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.

CVSS2: 5.3
0%
Низкий
около 13 лет назад
github логотип
GHSA-p5m6-f3fp-3v88

The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу