info
discussion
exploit
solution
references
Fortigate UTM appliances CA SSL Certificate Creation Security Bypass Vulnerability
Attackers use man-in-the-middle attacks to exploit this issue.
Privacy Statement
Copyright 2010, SecurityFocus