CVE-2012-4948
CVSS V2 Medium 5.3
CVSS V3 None
Description
The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.
Overview
- CVE ID
- CVE-2012-4948
- Assigner
- cret@cert.org
- Vulnerability Status
- Analyzed
- Published Version
- 2012-11-14T12:30:59
- Last Modified Date
- 2016-12-07T18:14:04
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:h:fortinet:fortigate-1000c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-100d:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-110c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-1240b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-200b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-20c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-300c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-3040b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-310b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-311b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-3140b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-3240c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-3810a:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-3950b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-40c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-5001a-sw:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-5001b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-5020:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-5060:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-50b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-5101c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-5140b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-600c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-60c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-620b:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-800c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-80c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigate-voice-80c:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:fortinet:fortigaterugged-100c:-:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:A/AC:H/Au:N/C:C/I:P/A:N
- Access Vector
- ADJACENT_NETWORK
- Access Compatibility
- HIGH
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 5.3
- Severity
- MEDIUM
- Exploitability Score
- 3.2
- Impact Score
- 7.8
References
Reference URL | Reference Tags |
---|---|
http://www.kb.cert.org/vuls/id/111708 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/56382 | Third Party Advisory VDB Entry |
http://osvdb.org/87048 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2012-4948 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4948 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 09:59:25 | Added to TrackCVE |