Overview
Barracuda Web Filter prior to version 8.1.0.005 does not properly check upstream certificate validity when performing SSL inspection, and delivers one of three default root CA certificates across multiple machines for SSL inspection.
Description
According to Barracuda Networks, the Barracuda Web Filter is a "comprehensive solution for web security and management" with many features, including the ability to provide "visibility into SSL-encrypted traffic". This SSL inspection feature of the Barracuda Web Filter is vulnerable to multiple issues. Incomplete validation of upstream certificate validity - CVE-2015-0961 Barracuda Networks has released a security advisory with more details. For more information on the impact of these issues on SSL inspection, please see Will Dormann's CERT/CC blog post on SSL Inspection. The CVSS score below is based on CVE-2015-0962. |
Impact
The impact of either CVE-2015-0961 or CVE-2015-0962 may allow an attacker to successfully achieve a man-in-the-middle (MITM) attack without the client knowing it. |
Solution
Update the firmware |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.8 | AV:N/AC:M/Au:N/C:C/I:C/A:N |
Temporal | 6.9 | E:POC/RL:OF/RC:C |
Environmental | 5.2 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Barracuda Networks for promptly addressing these issues and contacting the CERT/CC to coordinate disclosure.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2015-0961, CVE-2015-0962 |
Date Public: | 2015-04-28 |
Date First Published: | 2015-04-28 |
Date Last Updated: | 2015-04-28 17:08 UTC |
Document Revision: | 28 |