Cyberoam updates UTM certs to avoid traffic snooping

Security vendor Cyberoam has issued a hotfix for an interception vulnerability it downplayed this week. 

The update this week replaces generic certificates in Cyberoam Unified Threat Management (UTM) devices with unique ones.This squashes the possibility that the deep packet inspection (DPI) modules could intercept traffic from users assigned to different Cyberoam UTM boxes.

The update comes after a commenter to a blog post over the weekend published the default private key that was being used across Cyberoam's UTM devices.

Last month, Tor Project security researcher Runa Sandvik and OpenSSL's Ben Laurie discovered that the units relied on shared certificates that users must accept to have their encrypted traffic scanned, ostensibly for security threats.

Users accepting the certificates could be scanned by any Cyberoam DPI unit, the researchers found.

Cyberoam had refuted the allegations, along with suggestions by the researchers that private keys could be extracted from the devices.

"Cyberoam UTM either accepts or rejects, but does not store HTTPS Deep Scan Inspection data, as processing is done in real-time," the company said on its blog. "The possibility of data interception between any two Cyberoam appliances is hence nullified."

The fix generates a positive alert when it has been successfully applied.

This article originally appeared at SCMagazine.com.au

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.