Default Configuration of Fortinet Fortigate UTM Appliances Allows for SSL Server Spoofing

Default Configuration of Fortinet Fortigate UTM Appliances Allows for SSL Server Spoofing

CVE-2012-4948 · MEDIUM Severity

AV:A/AC:H/AU:N/C:C/I:P/A:N

The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.

Learn more about our Cis Benchmark Audit For Fortinet.