Vulnerability Details CVE-2012-4948
The default configuration of Fortinet Fortigate UTM appliances uses the same Certification Authority certificate and same private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the presence of the Fortinet_CA_SSLProxy certificate in a list of trusted root certification authorities.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.2%
CVSS Severity
CVSS v2 Score 5.3
Products affected by CVE-2012-4948
-
cpe:2.3:h:fortinet:fortigate-1000c:-
-
cpe:2.3:h:fortinet:fortigate-100d:-
-
cpe:2.3:h:fortinet:fortigate-110c:-
-
cpe:2.3:h:fortinet:fortigate-1240b:-
-
cpe:2.3:h:fortinet:fortigate-200b:-
-
cpe:2.3:h:fortinet:fortigate-20c:-
-
cpe:2.3:h:fortinet:fortigate-300c:-
-
cpe:2.3:h:fortinet:fortigate-3040b:-
-
cpe:2.3:h:fortinet:fortigate-310b:-
-
cpe:2.3:h:fortinet:fortigate-311b:-
-
cpe:2.3:h:fortinet:fortigate-3140b:-
-
cpe:2.3:h:fortinet:fortigate-3240c:-
-
cpe:2.3:h:fortinet:fortigate-3810a:-
-
cpe:2.3:h:fortinet:fortigate-3950b:-
-
cpe:2.3:h:fortinet:fortigate-40c:-
-
cpe:2.3:h:fortinet:fortigate-5001a-sw:-
-
cpe:2.3:h:fortinet:fortigate-5001b:-
-
cpe:2.3:h:fortinet:fortigate-5020:-
-
cpe:2.3:h:fortinet:fortigate-5060:-
-
cpe:2.3:h:fortinet:fortigate-50b:-
-
cpe:2.3:h:fortinet:fortigate-5101c:-
-
cpe:2.3:h:fortinet:fortigate-5140b:-
-
cpe:2.3:h:fortinet:fortigate-600c:-
-
cpe:2.3:h:fortinet:fortigate-60c:-
-
cpe:2.3:h:fortinet:fortigate-620b:-
-
cpe:2.3:h:fortinet:fortigate-800c:-
-
cpe:2.3:h:fortinet:fortigate-80c:-
-
cpe:2.3:h:fortinet:fortigate-voice-80c:-
-
cpe:2.3:h:fortinet:fortigaterugged-100c:-