Rapid7 Vulnerability & Exploit Database

Untrusted TLS/SSL server X.509 certificate

Back to Search

Untrusted TLS/SSL server X.509 certificate

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
01/01/1995
Created
07/25/2018
Added
10/19/2009
Modified
07/27/2015

Description

The server's TLS/SSL certificate is signed by a Certification Authority (CA) that is not well-known or trusted. This could happen if: the chain/intermediate certificate is missing, expired or has been revoked; the server hostname does not match that configured in the certificate; the time/date is incorrect; or a self-signed certificate is being used. The use of a self-signed certificate is not recommended since it could indicate that a TLS/SSL man-in-the-middle attack is taking place

Solution(s)

  • tls-untrusted-ca

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;