The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability note CVE-2012-4948

FortiGate: man-in-the-middle attack

Synthesis of the vulnerability

When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can create a fake server/proxy and intercept user's data.
Impacted products: FortiGate, FortiGate Virtual Appliance, FortiOS.
Severity: 2/4.
Creation date: 05/11/2012.
Identifiers: BID-56382, CVE-2012-4948, VIGILANCE-VUL-12109, VU#111708.

Description of the vulnerability

The FortiGate product can inspect SSL/TLS streams. In order to do so, it has a certification authority, and signs new server certificates. The client, who accepted this certification authority, sees no warning in his web browser.

However, the certification authority (public and private keys) is the same on all FortiGate. An attacker, who has access to one FortiGate can therefore obtain the private key. He can then create malicious server certificates, and sign them, so that users do not see a warning when connecting to the server.

When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can therefore create a fake server/proxy and intercept user's data.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerability alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities.