Man-in-the-Middle Vulnerability in Fortinet Fortigate UTM Appliances
CVE-2012-4948
Currently unrated
Summary
The default configuration of Fortinet Fortigate UTM appliances creates a critical security gap by using identical Certification Authority certificates and private keys across different installations. This uniformity enables potential man-in-the-middle attackers to easily spoof SSL servers by exploiting the Fortinet_CA_SSLProxy certificate, which is present in the list of trusted root certification authorities. Organizations relying on these appliances must ensure proper configuration and consider using unique certificates to mitigate this risk.
References
Timeline
Vulnerability published
Vulnerability Reserved