Check Point Advisories

Fraudulent Comodo Certificates HTTPS Spoofing

Check Point Reference: CPAI-2011-090
Date Published: 24 Mar 2011
Severity: Critical
Last Updated: Tuesday 02 January, 2018
Source:
Protection Provided by:

Security Gateway
R81, R80, R77, R75, R71, R70

Who is Vulnerable?
Vulnerability Description A security breach had been reported at Comodo, a certification authority present in the Trusted Root Certification Authorities Store on all supported versions of Microsoft Windows. Nine of Comodo's digital certificates had been signed on behalf of a third party without sufficiently validating its identity. These certificates may be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer.

Protection Overview

The protection will detect and block fraudulent Comodo certificates for addons.mozzilla.org, Global Trustee, login.live.com, login.skype.com, login.yahoo.com, mail.google.com and www.google.com.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Fraudulent Comodo Certificates HTTPS Spoofing protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  SSL Enforcement Violation.
Attack Information:  Fraudulent Comodo Certificates HTTPS Spoofing

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK