Unrated severityNVD Advisory· Published May 25, 2015· Updated May 6, 2026
CVE-2015-0962
CVE-2015-0962
Description
Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.
Affected products
6cpe:2.3:a:barracuda:web_filter:7.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:barracuda:web_filter:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:barracuda:web_filter:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:barracuda:web_filter:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:barracuda:web_filter:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:barracuda:web_filter:8.0.002:*:*:*:*:*:*:*
- cpe:2.3:a:barracuda:web_filter:8.0.003:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.kb.cert.org/vuls/id/534407nvdThird Party AdvisoryUS Government Resource
- blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/nvdVendor Advisory
- techlib.barracuda.com/BWF/UpdateSSLCertsnvdVendor Advisory
- www.barracuda.com/support/techalertsnvdVendor Advisory
News mentions
0No linked articles in our index yet.