Vulnerability Details : CVE-2012-3372
The default configuration of Cyberoam UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Cyberoam_SSL_CA certificate in a list of trusted root certification authorities. NOTE: the vendor disputes the significance of this issue because the appliance "does not allow import or export of the foresaid private key.
Products affected by CVE-2012-3372
- cpe:2.3:h:elitecore:cyberoam_unified_threat_management:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-3372
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3372
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
7.4
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.2
|
5.2
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-27 |
CWE ids for CVE-2012-3372
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3372
-
http://archives.neohapsis.com/archives/bugtraq/2012-07/0021.html
-
http://blog.cyberoam.com/2012/07/ssl-bridging-cyberoam-approach/
-
https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt
-
http://www.theregister.co.uk/2012/07/07/cyberoam_tor_ssl_spying_flap/
Security firm in Tor Project 'mass surveillance' row responds • The Register
-
https://blog.torproject.org/blog/security-vulnerability-found-cyberoam-dpi-devices-cve-2012-3372
Security vulnerability found in Cyberoam DPI devices (CVE-2012-3372) | Tor Blog
Jump to