vulnerability note CVE-2012-4948
FortiGate: man-in-the-middle attack
Synthesis of the vulnerability
When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can create a fake server/proxy and intercept user's data.Impacted products: FortiGate
, FortiGate Virtual Appliance
BID-56382, CVE-2012-4948, VIGILANCE-VUL-12109, VU#111708.
Description of the vulnerability
The FortiGate product can inspect SSL/TLS streams. In order to do so, it has a certification authority, and signs new server certificates. The client, who accepted this certification authority, sees no warning in his web browser.
However, the certification authority (public and private keys) is the same on all FortiGate. An attacker, who has access to one FortiGate can therefore obtain the private key. He can then create malicious server certificates, and sign them, so that users do not see a warning when connecting to the server.
When the administrator did not change the default certification authority for SSL/TLS inspection of FortiGate, an attacker can therefore create a fake server/proxy and intercept user's data.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides software vulnerability alerts
. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities.