Check Point Reference: | CPAI-2011-090 |
Date Published: | 24 Mar 2011 |
Severity: | Critical |
Last Updated: | Tuesday 02 January, 2018 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A security breach had been reported at Comodo, a certification authority present in the Trusted Root Certification Authorities Store on all supported versions of Microsoft Windows. Nine of Comodo's digital certificates had been signed on behalf of a third party without sufficiently validating its identity. These certificates may be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. |
The protection will detect and block fraudulent Comodo certificates for addons.mozzilla.org, Global Trustee, login.live.com, login.skype.com, login.yahoo.com, mail.google.com and www.google.com.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SSL Enforcement Violation.
Attack Information: Fraudulent Comodo Certificates HTTPS Spoofing