Vulnerability Description
Barracuda Web Filter before 8.1.0.005, when SSL Inspection is enabled, does not verify X.509 certificates from upstream SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Barracuda | Web Filter | <= 8.0.003 |
References
- http://www.kb.cert.org/vuls/id/534407Third Party AdvisoryUS Government Resource
- https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-Vendor Advisory
- https://techlib.barracuda.com/BWF/UpdateSSLCertsVendor Advisory
- https://www.barracuda.com/support/techalertsVendor Advisory
- http://www.kb.cert.org/vuls/id/534407Third Party AdvisoryUS Government Resource
- https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-Vendor Advisory
- https://techlib.barracuda.com/BWF/UpdateSSLCertsVendor Advisory
- https://www.barracuda.com/support/techalertsVendor Advisory
FAQ
What is CVE-2015-0961?
CVE-2015-0961 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Barracuda Web Filter before 8.1.0.005, when SSL Inspection is enabled, does not verify X.509 certificates from upstream SSL servers, which allows man-in-the-middle attackers to spoof servers and obtai...
How severe is CVE-2015-0961?
CVE-2015-0961 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0961?
Check the references section above for vendor advisories and patch information. Affected products include: Barracuda Web Filter.