Komodia Redirector Validate SSL And Installs Non-Unique Root CA Certificates And Private Keys Vulnerabilities
23 Jun. 2015
The SDK for Komodia Redirector with SSL Digestor, as used in Lavasoft Ad-Aware Web Companion 1.1.885.1766 and Ad-Aware AdBlocker (alpha) 188.8.131.52, Qustodio for Windows, Atom Security, Inc. StaffCop 5.8, and other products, uses the same X.509 certificate private key for a root CA certificate across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging knowledge of this key, as originally reported for Superfish VisualDiscovery on certain Lenovo Notebook laptop products.
The information has been provided by Marc Rogers.
* Lavasoft Ad-Aware Web Companion 1.1.885.1766 and Ad-Aware AdBlocker 184.108.40.206, Qustodio for Windows, Atom Security
* Lavasoft Ad-Aware Web Companion after 1.1.885.1766 and Ad-Aware AdBlocker after 220.127.116.11, Qustodio for Windows, Atom Security
Komodia Redirector SDK is a self-described "interception engine" designed to enable developers to integrate proxy services and web traffic modification (such as ad injection) into their applications. With the SSL Digestor module, HTTPS traffic can also be manipulated. This is accomplished by installing a root CA certificate into browser trusted certificate stores, enabling the proxy to effectively man-in-the-middle all web traffic without raising any flags for the end-user.