pastebin - collaborative debugging tool
kpaste.net RSS


Cyberoam Packet Inspection Devices Open Traffic To Third Parties
Posted by Anonymous on Thu 5th Jul 2012 06:48
raw | new post

  1. Cyberoam Packet Inspection Devices Open Traffic To Third Parties
  2.  
  3. "New submitter jetcityorange tipped us to a nasty security flaw in Cyberoam packet inspection devices. The devices are used by employers and despotic governments alike to intercept communications; in the case of employers probably for relatively mundane purposes (no torrenting at work). However, the CA key used to issue fake certificates so that the device can intercept SSL traffic is the same on every device, allowing every Cyberoam device to intercept traffic that passed through any other one. But that's not all: "It is therefore possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device - or, indeed, to extract the key from the device and import it into other DPI devices, and use those for interception. Perhaps ones from more competent vendors.""
  4.  
  5. - http://tech.slashdot.org/story/12/07/04/1640202/cyberoam-packet-inspection-devices-open-traffic-to-third-parties
  6.  
  7.   o_
  8.  /|
  9.  / \
  10.  
  11. "Security vulnerability found in Cyberoam DPI devices (CVE-2012-3372)
  12. Posted July 3rd, 2012 by Runa"
  13.  
  14. - https://blog.torproject.org/blog/security-vulnerability-found-cyberoam-dpi-devices-cve-2012-3372
  15.  
  16.  _o_
  17.   |
  18.  / \
  19.  
  20. "Vulnerability in Cyberoam DPI devices [30 Jun 2012] (CVE-2012-3372)"
  21.  
  22. - https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt
  23.  
  24.  /o_
  25.   |
  26.  / \
  27.  
  28. "TOR project uncovers flaw in mass-surveillance appliance"
  29.  
  30. "The TOR team have discovered a fake certificate in the wild. The certificate, issued by a US company called Cyberoam, was used in an attempt to trick a user in Jordan into believing that her/his connection to the TOR website, was private and secure, though in fact it was being spied upon by a Cyberoam device. Cyberoam makes "deep packet inspection" software, used in mass surveillance of Internet traffic, and as TOR's Runa Sandvik and OpenSSL's Ben Laurie investigated the matter, they discovered that all Cyberoam devices share a common vulnerability related to their handling of certificates. The company was notified of this on June 30, and told that the vulnerability would be made public today.
  31.  
  32.     Last week, a user in Jordan reported seeing a fake certificate for torproject.org. The user did not report any errors when browsing to sites such as Gmail, Facebook, and Twitter, which suggests that this was a targeted attack. The certificate was issued by a US company called Cyberoam. We first believed that this incident was similar to that of Comodo and DigiNotar, and that Cyberoam had been tricked to issue a fake certificate for our website.
  33.  
  34.     After a bit of research, we learned that Cyberoam make a range of devices used for Deep Packet Inspection (DPI). The user was not just seeing a fake certificate for torproject.org, his connection was actually being intercepted by one of their devices. While investigating this further, Ben Laurie and I found a security vulnerability affecting all Cyberoam DPI devices.
  35.  
  36.     Examination of a certificate chain generated by a Cyberoam DPI device shows that all such devices share the same CA certificate and hence the same private key. It is therefore possible to intercept traffic from any victim of a Cyberoam device with any other Cyberoam device - or to extract the key from the device and import it into other DPI devices, and use those for interception."
  37.  
  38. - http://boingboing.net/2012/07/03/tor-project-uncovers-flaw-in-m.html
  39.  
  40.  /o\
  41.   |
  42.  / \
  43.  
  44. "Cyberoam DPI devices vulnerable to traffic interception"
  45.  
  46. "The Tor researchers recommend that users who are concerned by this issue should check their browsers and see whether any certificates from Cyberoam have been installed.
  47.  
  48. - http://www.h-online.com/security/news/item/Cyberoam-DPI-devices-vulnerable-to-traffic-interception-1632004.html

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at