CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.9 | $0-$5k | 0.04 |
A vulnerability was found in Fortinet FortiOS (Firewall Software) (affected version not known). It has been declared as problematic. Affected by this vulnerability is some unknown functionality of the component self-signed Fortigate CA certificate. The manipulation with an unknown input leads to a config vulnerability. The CWE definition for the vulnerability is CWE-16. As an impact it is known to affect confidentiality. The summary by CVE is:
The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.
The weakness was presented 11/02/2012 by Bitwiper as not defined posting (Website). It is possible to read the advisory at kb.cert.org. This vulnerability is known as CVE-2012-4948 since 09/17/2012. The exploitation appears to be difficult. The attack can only be initiated within the local network. The exploitation doesn't need any form of authentication. Technical details are unknown but a public exploit is available. The attack technique deployed by this issue is T1592.004 according to MITRE ATT&CK.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 62969 (SSL Certificate Signed with the Compromised FortiGate Key), which helps to determine the existence of the flaw in a target environment. It is assigned to the family General.
The best possible mitigation is suggested to be Workaround.
The vulnerability is also documented in the databases at X-Force (79781), Tenable (62969), SecurityFocus (BID 56382†), OSVDB (87048†) and Vulnerability Center (SBV-37442†). Additional details are provided at kb.cert.org. See VDB-253259, VDB-253260, VDB-256510 and VDB-259850 for similar entries.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.3
VulDB Temp Score: 4.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: ConfigCWE: CWE-16
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 62969
Nessus Name: SSL Certificate Signed with the Compromised FortiGate Key
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: WorkaroundStatus: 🔍
0-Day Time: 🔍
Workaround: Import new CA Certificate
Timeline
09/17/2012 🔍11/02/2012 🔍
11/02/2012 🔍
11/02/2012 🔍
11/05/2012 🔍
11/08/2012 🔍
11/14/2012 🔍
11/19/2012 🔍
11/28/2012 🔍
04/19/2021 🔍
Sources
Vendor: fortinet.comAdvisory: kb.cert.org
Researcher: Bitwiper
Status: Not defined
CVE: CVE-2012-4948 (🔍)
X-Force: 79781
SecurityFocus: 56382 - Fortigate UTM appliances CA SSL Certificate Creation Security Bypass Vulnerability
OSVDB: 87048
Vulnerability Center: 37442 - Fortinet Fortigate UTM Spoofing of SSL Servers due to Same Certificate and Key For Different Clients, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 11/08/2012 17:46Updated: 04/19/2021 07:09
Changes: 11/08/2012 17:46 (70), 03/07/2018 09:31 (2), 04/19/2021 07:09 (3)
Complete: 🔍
Committer: olku
Cache ID: 13:4DD:103
No comments yet. Languages: en.
Please log in to comment.