VYPR
Unrated severityNVD Advisory· Published May 25, 2015· Updated May 6, 2026

CVE-2015-0962

CVE-2015-0962

Description

Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.

Affected products

6
  • cpe:2.3:a:barracuda:web_filter:7.0:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:barracuda:web_filter:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:barracuda:web_filter:7.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:barracuda:web_filter:7.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:barracuda:web_filter:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:barracuda:web_filter:8.0.002:*:*:*:*:*:*:*
    • cpe:2.3:a:barracuda:web_filter:8.0.003:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.