vendor:
Kaspersky Internet Security
by:
Google Security Research
7.5
CVSS
HIGH
Certificate Validation Bypass
352
CWE
Product Name: Kaspersky Internet Security
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows
Certificate Validation Bypass via Malicious Certificate Name
When Kaspersky https inspection is enabled, temporary certificates are created in %PROGRAMDATA% for validation. The naming pattern of these certificates is {CN}.cer. By creating a malicious certificate with a specially crafted Common Name (CN), an attacker can bypass certificate validation and potentially execute arbitrary code. The attacker can generate a certificate using OpenSSL and then start a server to serve the malicious certificate. When a Windows host with Kaspersky installed navigates to the server, Kaspersky will create a certificate with the specified name on the desktop, allowing the attacker to potentially execute code.
Mitigation:
Apply the patch provided by the vendor. Disable Kaspersky https inspection if not required. Ensure that the Common Name (CN) of certificates does not allow arbitrary code execution.